CVE-2026-5631
assafelovic gpt-researcher ws Endpoint server_utils.py extract_command_data code injection
CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
14th
A vulnerability has been found in assafelovic gpt-researcher up to 3.4.3. This affects the function extract_command_data of the file backend/server/server_utils.py of the component ws Endpoint. Such manipulation of the argument args leads to code injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
| CWE | CWE-94 CWE-74 |
| Vendor | assafelovic |
| Product | gpt-researcher |
| Published | Apr 6, 2026 |
| Last Updated | Apr 6, 2026 |
Stay Ahead of the Next One
Get instant alerts for assafelovic gpt-researcher
Be the first to know when new high vulnerabilities affecting assafelovic gpt-researcher are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
assafelovic / gpt-researcher
3.4.0 3.4.1 3.4.2 3.4.3
References
Credits
๐ Yu-Bao (VulDB User) VulDB CNA Team