๐Ÿ” CVE Alert

CVE-2026-27952

HIGH 8.8

Agenta has Python Sandbox Escape, Leading to Remote Code Execution (RCE)

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

Agenta is an open-source LLMOps platform. In Agenta-API prior to version 0.48.1, a Python sandbox escape vulnerability existed in Agenta's custom code evaluator. Agenta used RestrictedPython as a sandboxing mechanism for user-supplied evaluator code, but incorrectly whitelisted the `numpy` package as safe within the sandbox. This allowed authenticated users to bypass the sandbox and achieve arbitrary code execution on the API server. The escape path was through `numpy.ma.core.inspect`, which exposes Python's introspection utilities โ€” including `sys.modules` โ€” thereby providing access to unfiltered system-level functionality like `os.system`. This vulnerability affects the Agenta self-hosted platform (API server), not the SDK when used as a standalone Python library. The custom code evaluator runs server-side within the API process. The issue is fixed in v0.48.1 by removing `numpy` from the sandbox allowlist. In later versions (v0.60+), the RestrictedPython sandbox was removed entirely and replaced with a different execution model.

CWE CWE-94
Vendor agenta-ai
Product agenta-api
Published Feb 26, 2026
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for agenta-ai agenta-api

Be the first to know when new high vulnerabilities affecting agenta-ai agenta-api are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Agenta-AI / agenta-api
< 0.48.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/Agenta-AI/agenta/security/advisories/GHSA-pmgp-2m3v-34mq