๐Ÿ” CVE Alert

CVE-2026-6111

MEDIUM 6.3

FoundationAgents MetaGPT common.py decode_image server-side request forgery

CVSS Score
6.3
EPSS Score
0.0%
EPSS Percentile
13th

A security flaw has been discovered in FoundationAgents MetaGPT up to 0.8.1. This impacts the function decode_image of the file metagpt/utils/common.py. The manipulation of the argument img_url_or_b64 results in server-side request forgery. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

CWE CWE-918
Vendor foundationagents
Product metagpt
Published Apr 12, 2026
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for foundationagents metagpt

Be the first to know when new medium vulnerabilities affecting foundationagents metagpt are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

FoundationAgents / MetaGPT
0.8.0 0.8.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/356971 vuldb.com: https://vuldb.com/vuln/356971/cti vuldb.com: https://vuldb.com/submit/791762 github.com: https://github.com/FoundationAgents/MetaGPT/issues/1934 github.com: https://github.com/FoundationAgents/MetaGPT/pull/1941 github.com: https://github.com/FoundationAgents/MetaGPT/

Credits

๐Ÿ” Eric-d (VulDB User) VulDB CNA Team