Cyber Posture

CVE-2026-42079

High

Published: 04 May 2026

Published
04 May 2026
Modified
04 May 2026
KEV Added
Patch
CVSS Score 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0002 6.5th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

PPTAgent is an agentic framework for reflective PowerPoint generation. Prior to commit 418491a, PPTAgent is vulnerable to arbitrary code execution via Python eval() of LLM-generated code with builtins in scope. This issue has been patched via commit 418491a.

Security SummaryAI

CVE-2026-42079 is an arbitrary code execution vulnerability in PPTAgent, an agentic framework for reflective PowerPoint generation. Prior to commit 418491a, the framework executes LLM-generated code using Python's eval() function with builtins in scope, enabling attackers to run arbitrary Python code. The issue is classified as CWE-95 (Improper Neutralization of Special Elements used in an eval() or Similar Function while Processing User-Controlled Input) and carries a CVSS v3.1 base score of 8.6 (AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).

An attacker with local access can exploit this vulnerability with low complexity and no required privileges, but it requires user interaction, such as tricking a user into processing malicious input that influences LLM code generation. Successful exploitation grants arbitrary code execution on the host system, resulting in high impacts to confidentiality, integrity, and availability, along with a scope change that affects the broader system.

The vulnerability has been patched in commit 418491a of the PPTAgent repository. Additional details are available in the GitHub security advisory GHSA-89g2-xw5c-v95p.

This flaw underscores risks in AI/ML agentic workflows where LLM outputs are directly evaluated, as seen in PPTAgent's PowerPoint generation pipeline. No public information on real-world exploitation is available.

Details

CWE(s)

AI Security AnalysisAI

AI Category
Other AI Platforms
Risk Domain
N/A
OWASP Top 10 for LLMs 2025
None mapped
MITRE ATLAS Techniques
None mapped
Classification Reason
Matched keywords: llm

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1059.006 Python Execution
Adversaries may abuse Python commands and scripts for execution.
Why these techniques?

Arbitrary Python code execution via unsafe eval() of LLM-generated input directly enables T1059.006 (Python interpreter) and is triggered via client-side exploitation requiring user interaction (T1203).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References