MaxKB is an open-source AI assistant for enterprise. Prior to version 2.0.0, the sandbox design rules can be bypassed because MaxKB only restricts the execution permissions of files in a specific directory. Therefore, an attacker can use the `shutil.copy2` method in Python to copy the command they want to execute to the executable directory. This bypasses directory restrictions and reverse shell. Version 2.0.0 fixes the issue.
History

Sat, 02 Aug 2025 01:45:00 +0000

Type Values Removed Values Added
First Time appeared Maxkb
Maxkb maxkb
CPEs cpe:2.3:a:maxkb:maxkb:*:*:*:*:lts:*:*:*
Vendors & Products Maxkb
Maxkb maxkb

Thu, 17 Jul 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 17 Jul 2025 14:00:00 +0000

Type Values Removed Values Added
Description MaxKB is an open-source AI assistant for enterprise. Prior to version 2.0.0, the sandbox design rules can be bypassed because MaxKB only restricts the execution permissions of files in a specific directory. Therefore, an attacker can use the `shutil.copy2` method in Python to copy the command they want to execute to the executable directory. This bypasses directory restrictions and reverse shell. Version 2.0.0 fixes the issue.
Title MaxKB sandbox bypass
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-07-17T13:50:18.268Z

Updated: 2025-07-17T19:56:23.111Z

Reserved: 2025-07-14T17:23:35.259Z

Link: CVE-2025-53927

cve-icon Vulnrichment

Updated: 2025-07-17T19:55:48.900Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-17T14:15:32.403

Modified: 2025-08-02T01:34:28.363

Link: CVE-2025-53927

cve-icon Redhat

No data.