CVE-2026-6117
Sandbox Escape via File Manipulation in AstrBot install-upload Endpoint
Publication date: 2026-04-12
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| astrbotdevs | astrbot | to 4.22.1 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-265 | |
| CWE-264 | Permissions, Privileges, and Access Controls |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-6117 is a vulnerability in AstrBot versions up to 4.22.1 that affects the plugin upload functionality. Specifically, it exists in the install_plugin_upload function of the install-upload endpoint. Authenticated users can upload malicious plugin ZIP files containing Python code that is dynamically imported without any code signing verification, sandboxing, or content validation.
When a malicious plugin ZIP is uploaded, its main Python module (main.py) is imported immediately using Python's __import__() function, causing any code in that file to execute on the server. This allows an attacker to execute arbitrary code remotely with the privileges of the AstrBot process.
How can this vulnerability impact me? :
This vulnerability can lead to full remote code execution on the AstrBot server, allowing an attacker to run arbitrary code with the same privileges as the AstrBot process.
- Complete server compromise
- Data exfiltration, including API keys, chat history, and user data
- Lateral movement within the network
- Installation of persistent backdoors
- Denial of service attacks
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for suspicious activity related to the plugin upload endpoint `/api/plugin/install-upload` on the AstrBot server. Since the exploit involves uploading malicious plugin ZIP files containing Python code that executes immediately, detection can focus on identifying unusual POST requests to this endpoint, especially those authenticated with JWT tokens obtained via default credentials.
Commands to detect potential exploitation attempts could include inspecting web server logs for POST requests to `/api/plugin/install-upload` and checking for unusual file creation or execution on the server, such as the presence of unexpected files like `/tmp/rce_proof.txt`.
- Use grep or similar tools to find POST requests to the vulnerable endpoint in logs: `grep "/api/plugin/install-upload" /var/log/nginx/access.log`
- Check for suspicious files created by malicious plugins, e.g., `ls -l /tmp/rce_proof.txt`
- Monitor running Python processes or unusual imports that may indicate dynamic code execution.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the plugin upload endpoint and preventing unauthorized or unauthenticated users from uploading plugins.
Additional recommended actions are:
- Implement code signing verification for all plugins before loading them to ensure integrity.
- Run plugins in sandboxed environments, such as separate processes with restricted permissions, to limit potential damage.
- Maintain an allowlist of approved plugin sources to prevent untrusted code execution.
- Perform content scanning on uploaded plugin archives to detect dangerous imports or functions like `os.system`, `subprocess`, `exec`, and `eval`.
- Require explicit user confirmation with security warnings before loading plugin code.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows authenticated users to upload malicious plugins that execute arbitrary code on the AstrBot server, potentially leading to full server compromise.
This can result in unauthorized access to sensitive data such as API keys, chat history, and user data, which may violate data protection regulations like GDPR and HIPAA.
The risk of data exfiltration and persistent backdoors increases the likelihood of non-compliance with these standards, as they require strict controls on data confidentiality, integrity, and system security.
Therefore, without proper mitigation, this vulnerability could lead to breaches of compliance obligations under common standards and regulations.