CVE-2025-53927

medium

Description

MaxKB is an open-source AI assistant for enterprise. Prior to version 2.0.0, the sandbox design rules can be bypassed because MaxKB only restricts the execution permissions of files in a specific directory. Therefore, an attacker can use the `shutil.copy2` method in Python to copy the command they want to execute to the executable directory. This bypasses directory restrictions and reverse shell. Version 2.0.0 fixes the issue.

References

https://github.com/1Panel-dev/MaxKB/security/advisories/GHSA-5xhm-4j3v-87m4

https://github.com/1Panel-dev/MaxKB/releases/tag/v2.0.0

Details

Source: Mitre, NVD

Published: 2025-07-17

Updated: 2025-07-17

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:N/AC:H/Au:S/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 4.6

Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L

Severity: Medium

EPSS

EPSS: 0.00035