Cybersecurity AI (CAI) is an open-source framework for building and deploying AI-powered offensive and defensive automation. Versions 0.5.9 and below are vulnerable to Command Injection through the run_ssh_command_with_credentials() function, which is available to AI agents. Only password and command inputs are escaped in run_ssh_command_with_credentials to prevent shell injection; while username, host and port values are injectable. This issue does not have a fix at the time of publication.
References
| Link | Resource |
|---|---|
| https://github.com/aliasrobotics/cai/commit/09ccb6e0baccf56c40e6cb429c698750843a999c | Patch |
| https://github.com/aliasrobotics/cai/security/advisories/GHSA-4c65-9gqf-4w8h | Exploit Vendor Advisory |
| https://www.hacktivesecurity.com/blog/2025/12/10/cve-2025-67511-tricking-a-security-ai-agent-into-pwning-itself | Exploit Press/Media Coverage Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-11 00:16
Updated : 2026-03-17 21:07
NVD link : CVE-2025-67511
Mitre link : CVE-2025-67511
CVE.ORG link : CVE-2025-67511
JSON object : View
Products Affected
aliasrobotics
- cybersecurity_ai
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
