CVE-2026-6111
FoundationAgents MetaGPT common.py decode_image server-side request forgery
CVSS Score
6.3
EPSS Score
0.0%
EPSS Percentile
13th
A security flaw has been discovered in FoundationAgents MetaGPT up to 0.8.1. This impacts the function decode_image of the file metagpt/utils/common.py. The manipulation of the argument img_url_or_b64 results in server-side request forgery. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
| CWE | CWE-918 |
| Vendor | foundationagents |
| Product | metagpt |
| Published | Apr 12, 2026 |
| Last Updated | Apr 13, 2026 |
Stay Ahead of the Next One
Get instant alerts for foundationagents metagpt
Be the first to know when new medium vulnerabilities affecting foundationagents metagpt are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
FoundationAgents / MetaGPT
0.8.0 0.8.1
References
vuldb.com: https://vuldb.com/vuln/356971 vuldb.com: https://vuldb.com/vuln/356971/cti vuldb.com: https://vuldb.com/submit/791762 github.com: https://github.com/FoundationAgents/MetaGPT/issues/1934 github.com: https://github.com/FoundationAgents/MetaGPT/pull/1941 github.com: https://github.com/FoundationAgents/MetaGPT/
Credits
๐ Eric-d (VulDB User) VulDB CNA Team