๐Ÿ” CVE Alert

CVE-2026-5631

HIGH 7.3

assafelovic gpt-researcher ws Endpoint server_utils.py extract_command_data code injection

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
14th

A vulnerability has been found in assafelovic gpt-researcher up to 3.4.3. This affects the function extract_command_data of the file backend/server/server_utils.py of the component ws Endpoint. Such manipulation of the argument args leads to code injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

CWE CWE-94 CWE-74
Vendor assafelovic
Product gpt-researcher
Published Apr 6, 2026
Last Updated Apr 6, 2026
Stay Ahead of the Next One

Get instant alerts for assafelovic gpt-researcher

Be the first to know when new high vulnerabilities affecting assafelovic gpt-researcher are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

assafelovic / gpt-researcher
3.4.0 3.4.1 3.4.2 3.4.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/355419 vuldb.com: https://vuldb.com/vuln/355419/cti vuldb.com: https://vuldb.com/submit/785858 github.com: https://github.com/assafelovic/gpt-researcher/issues/1694 github.com: https://github.com/assafelovic/gpt-researcher/

Credits

๐Ÿ” Yu-Bao (VulDB User) VulDB CNA Team