Cognee thru v0.4.0 contains a critical remote code execution vulnerability in its notebook cell execution API endpoint. The endpoint is designed to execute arbitrary Python code provided by the user, but it does so using the unsafe exec() function without any sandboxing, validation, or security controls. An attacker can exploit this by sending a specially crafted POST request containing malicious Python code to the execution endpoint. This leads to arbitrary code execution on the Cognee server with the privileges of the server process, allowing complete compromise of the system.
History

Wed, 13 May 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Topoteretes
Topoteretes cognee
Vendors & Products Topoteretes
Topoteretes cognee

Tue, 12 May 2026 19:30:00 +0000

Type Values Removed Values Added
Title Arbitrary Code Execution via Unsandboxed exec() in Cognee Notebook API
Weaknesses CWE-20
CWE-94

Tue, 12 May 2026 17:30:00 +0000

Type Values Removed Values Added
Description Cognee thru v0.4.0 contains a critical remote code execution vulnerability in its notebook cell execution API endpoint. The endpoint is designed to execute arbitrary Python code provided by the user, but it does so using the unsafe exec() function without any sandboxing, validation, or security controls. An attacker can exploit this by sending a specially crafted POST request containing malicious Python code to the execution endpoint. This leads to arbitrary code execution on the Cognee server with the privileges of the server process, allowing complete compromise of the system.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2026-05-12T00:00:00.000Z

Updated: 2026-05-12T17:07:35.349Z

Reserved: 2026-03-09T00:00:00.000Z

Link: CVE-2026-31231

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T18:16:51.387

Modified: 2026-05-12T18:16:51.387

Link: CVE-2026-31231

cve-icon Redhat

No data.