Vulnerability Platform
- AI
Home
POCs
Intel
Stats
Pricing
More
API Docs
Affected Products
Bounty Intel
chars
About
Search
English
δΈζ
English
ζ₯ζ¬θͺ
Theme
Default
Anime Pink
Feeling Rich
Login
Goal Reached
Thanks to every supporter β we hit 100%!
Goal: 1000 CNY Β· Raised:
1000
CNY
100.0%
Buy Us a Coffee
Home
CVE-2026-27597
AI Analysis Summary
CVE-2026-27597
β AI Deep Analysis Summary
Updated May 06, 2026
CVSS 10.0 Β· Critical
This is a
summary
of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login.
Read the full analysis β
Q1
What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Code Injection in Enclave (AgentFront). π **Consequences**: Security boundary escape β Remote Code Execution (RCE). Critical integrity loss!
Q2
Root Cause? (CWE/Flaw)
π‘οΈ **CWE-94**: Improper Control of Generation of Code (Code Injection). π₯ **Flaw**: Unsafe handling allows escaping `@enclave-vm/core` sandbox boundaries.
Q3
Who is affected? (Versions/Components)
π¦ **Vendor**: AgentFront. π¦ **Product**: Enclave. π **Affected**: Versions **< 2.11.1**. β **Safe**: 2.11.1+.
Q4
What can hackers do? (Privileges/Data)
π **Privileges**: Full Remote Code Execution (RCE). π **Data**: Complete compromise (Confidentiality, Integrity, Availability all High).
Q5
Is exploitation threshold high? (Auth/Config)
π **Auth**: None (PR:N). π **Network**: Remote (AV:N). π― **Complexity**: Low (AC:L). π **Threshold**: VERY LOW. Easy to exploit!
Q6
Is there a public Exp? (PoC/Wild Exploitation)
π **Public Exp?**: No PoCs listed in data. β οΈ **Risk**: CVSS 10.0 implies high likelihood of wild exploitation soon. Stay alert!
Q7
How to self-check? (Features/Scanning)
π **Check**: Scan for `agentfront/enclave` versions < 2.11.1. π‘ **Feature**: Look for `@enclave-vm/core` usage. Verify version numbers!
Q8
Is it fixed officially? (Patch/Mitigation)
π©Ή **Fixed?**: YES. π **Date**: 2026-02-25. π **Patch**: Commit `09afbebe...` on GitHub. Update immediately!
Q9
What if no patch? (Workaround)
π§ **No Patch?**: Isolate network. π **Mitigate**: Restrict input to Enclave components. π« **Block**: External access to vulnerable endpoints.
Q10
Is it urgent? (Priority Suggestion)
π₯ **Urgency**: CRITICAL (CVSS 10.0). π¨ **Priority**: PATCH NOW! RCE risk is immediate. Do not delay!
Continue exploring
Vulnerability detail
Full AI analysis (login)
agentfront
CWE-94