Bounties
Partners
Community
Info
modelscope / agentscope
Project repository
Start building LLM-empowered multi-agent applications in an easier way.
Submit a report
FIRST INTERACTION
WITHIN
7 DAYS
REVIEW
WITHIN
11 DAYS
FIX
WITHIN
N/A DAYS
XSS through Run the workflow
Nov 14th 2024
360vulnerabilityresearchinstitute
•
duplicate
Medium
RCE in call_agent_func Function Due to Unsafe Pickle Deserialization
Feb 12th 2025
revenge-fox
•
duplicate
Critical
RCE in _process_task Function Due to Unsafe Pickle Deserialization
Feb 12th 2025
revenge-fox
•
duplicate
Critical
Arbitrary File Deletion
Nov 13th 2024
ajmalabubakkr
•
duplicate
Critical
Remote code execution via the `/RpcAgent/call_agent_func` rpc endpoint
Feb 10th 2025
williwollo
•
duplicate
Critical
RCE in create_agent Function Due to Unsafe Pickle Deserialization
Feb 10th 2025
revenge-fox
•
duplicate
Critical
Arbitrary json file write via the `/save-workflow` endpoint.
Feb 9th 2025
williwollo
•
duplicate
Critical
Arbitrary json file read via the `/load-workflow` endpoint
Feb 8th 2025
williwollo
•
duplicate
High
Arbitrary file deletion via `/delete-workflow` endpoint
Feb 8th 2025
williwollo
•
duplicate
Critical
Remote code execution vulnerability due to the /convert-to-py-and-run interface...
Feb 5th 2025
eggdkk
•
duplicate
Critical
Arbitrary json file reading
Feb 5th 2025
nduy2110
•
duplicate
High
Arbitrary file deleting
Feb 5th 2025
nduy2110
•
duplicate
Critical
Arbitrary json file write/overwrite
Feb 5th 2025
nduy2110
•
duplicate
High
JSON File Write on Arbitrary Locations
Feb 5th 2025
ajmalabubakkr
•
duplicate
High
Delete Arbitrary file in the filesystem at /delete-workflow
Feb 5th 2025
insomniahax
•
duplicate
Critical
Create/Overwrite any json file in local filesystem at /save-workflow
Feb 4th 2025
insomniahax
•
duplicate
High
Read any local json file via path traversal on /load-workflow
Feb 4th 2025
insomniahax
•
duplicate
High
An unexpected POST request causes the server to shut down
Jan 9th 2025
nduy2110
•
informative
High
RCE in convert-to-py endpoint
Nov 6th 2024
nduy2110
•
duplicate
Critical
Arbitrary File Read For JSON Files
Jan 10th 2025
jkylekelly
•
duplicate
High
Arbitrary File Deletion via /delete-workflow
Jan 10th 2025
jkylekelly
•
duplicate
Critical
Stored XSS in /save-workflow endpoint
Oct 3rd 2024
anandsreekumaras
•
duplicate
High
Arbitrary file read in distributed setup
Dec 17th 2024
lager1
•
duplicate
High
Model configuration file secret leak via path traversal
Dec 9th 2024
h2oa
•
duplicate
Critical
Path traversal lead to modify model configuration file
Dec 9th 2024
h2oa
•
duplicate
Critical
Path traversal to delete any file
Dec 9th 2024
h2oa
•
duplicate
Critical
Arbitrary file read caused by lack of restrictions on API parameters.
Dec 1st 2024
mouchen626
•
duplicate
High
Unauthenticated Remote Code Execution via The use of eval in is_callable_express...
Nov 25th 2024
aftersnows
•
duplicate
Critical
Agentscope v0.0.4 Arbitrary File Read Vulnerability
Nov 20th 2024
web-hacker-team
•
duplicate
Critical
agentscope v0.0.4 Arbitrary JSON File Read Vulnerability
Nov 20th 2024
web-hacker-team
•
duplicate
High
agentscope v0.0.4 Arbitrary JSON File Read Vulnerability
Nov 20th 2024
web-hacker-team
•
duplicate
High
agentscope v0.0.4 Arbitrary JSON File Overwrite Vulnerability
Nov 20th 2024
web-hacker-team
•
duplicate
Critical
Arbitrary write anywhere on the server through the /save-workflow endpoint
Nov 17th 2024
winters0x64
•
duplicate
Critical
CORS Misconfiguration which leads to leaking info leading to CSRF
Nov 17th 2024
alfinj0se
•
duplicate
Medium
AgentScope RPC Framework Deserialization Remote-Code execution in modelscope/age...
Nov 17th 2024
retr0reg
•
duplicate
Critical
Server side request forgery
Sep 6th 2024
lager1
•
informative
Medium
Ability to delete any files on the server which could lead to DOS and much more
Nov 13th 2024
winters0x64
•
duplicate
Critical
Stored XSS in the dashboard
Nov 13th 2024
alfinj0se
•
duplicate
Medium
agentscope.studio Path Traversal and Unauthorized File Writing
Nov 13th 2024
morphykutay
•
duplicate
Critical
Local File Read (LFI) via GET /api/file API end point
Nov 13th 2024
zpbrent
•
duplicate
High
Remote Code Execution via POST /convert-to-py API end point
Nov 13th 2024
zpbrent
•
duplicate
Critical
Remote Code Execution via POST /convert-to-py-and-run API end point
Nov 13th 2024
zpbrent
•
duplicate
Critical
0 click RCE by chaining multiple vulnerabilities
Nov 13th 2024
winters0x64
•
duplicate
Critical
Arbitrary File Delete via delete-workflow API end point
Nov 13th 2024
zpbrent
•
duplicate
Critical
arbitrary json file write/read
Nov 12th 2024
0xanis
•
Critical
•
$900
Critical
•
$900
•
CVE-2024-8551
CVE-2024-8551
Path traversal that leads to arbitrary file delete
Nov 12th 2024
0xanis
•
Critical
•
$900
Critical
•
$900
•
CVE-2024-8537
CVE-2024-8537
Local File Read (LFI) via download_file RPC endpoint
Nov 12th 2024
zpbrent
•
duplicate
High
LFI in /load-workflow endpoint allows reading API keys and other files from the...
Nov 12th 2024
winters0x64
•
High
•
$450
High
•
$450
•
CVE-2024-8550
CVE-2024-8550
agentscope.studio Path Traversal
Nov 12th 2024
morphykutay
•
duplicate
Critical
LFI in /read-examples endpoint allows reading API keys and other sensitive files
Nov 11th 2024
winters0x64
•
duplicate
High
Local File Read (LFI) by public API `/api/file`
Nov 11th 2024
lyutoon
•
duplicate
High
Remote Code Execution by calling public API `convert-to-py`
Nov 11th 2024
lyutoon
•
duplicate
Critical
Remote Code Execution in /convert-to-py endpoint
Nov 10th 2024
winters0x64
•
duplicate
Critical
Local File Read (LFI) by API leads to Sensitive Information Leak
Nov 10th 2024
virusday
•
duplicate
High
Local File Inclusion in /api/file endpoint which leaks sensitive information lik...
Nov 10th 2024
winters0x64
•
duplicate
High
RPC Framework arbitrary file exposure
Nov 10th 2024
retr0reg
•
duplicate
High
Arbitrary file reading via path traversal
Nov 10th 2024
virusday
•
duplicate
High
AgentScope RPC Framework Deserialization Remote-Code execution
Nov 10th 2024
retr0reg
•
duplicate
Critical
workflowdag -> sanitize_node_data Remote-code execution
Nov 10th 2024
retr0reg
•
duplicate
Critical
Path traversal in '/read-examples'
Nov 10th 2024
retr0reg
•
duplicate
High
Local file inclusion via "/api/file"
Nov 10th 2024
retr0reg
•
duplicate
Critical
Local file inclusion in AgentScope Server
Nov 9th 2024
patrik-ha
•
duplicate
High
Local file inclusion in AgentScope Studio
Nov 9th 2024
patrik-ha
•
duplicate
High
Remote code execution in AgentScope Server through pickle/dill-deserialization
Nov 9th 2024
patrik-ha
•
duplicate
Critical
Code Injection
Nov 9th 2024
mvlttt
•
duplicate
Critical
Local File Inclusion (LFI)
Nov 9th 2024
mvlttt
•
duplicate
High
Path Traversal in /api/file endpoint
Nov 8th 2024
rook1337
•
duplicate
Critical
Unrestricted File Downloads on [GET] /api/file
Nov 8th 2024
crackatoa
•
duplicate
High
Path traversal on src/agentscope/studio/_app.py
Nov 8th 2024
crackatoa
•
duplicate
High
Remote code execution through eager evaluation of workflow arguments
Nov 8th 2024
patrik-ha
•
duplicate
Critical
Stored XSS through run ID
Nov 7th 2024
patrik-ha
•
Medium
•
$75
Medium
•
$75
•
CVE-2024-8556
CVE-2024-8556
Remote code execution through code injection in workflow conversion endpoint
Nov 7th 2024
patrik-ha
•
duplicate
Critical
RCE vulnerability via /convert-to-py-and-run in AgentScope Studio
Nov 7th 2024
7resp4ss
•
duplicate
Critical
Arbitrary File Read vulnerability via AgentScope Studio
Nov 7th 2024
7resp4ss
•
duplicate
Critical
Cross Site Scripting
Sep 6th 2024
dan-xzero
•
informative
Critical
Code Injection at API /convert-to-py
Nov 7th 2024
ngductung
•
duplicate
Critical
Remote Code Execution via Deserialization in RpcAgentServerLauncher of modelscop...
Jan 1st 2025
bayuncao
•
Critical
•
$900
Critical
•
$900
•
CVE-2024-8502
CVE-2024-8502
Code injection to RCE
Nov 7th 2024
kienzx203
•
duplicate
Critical
@_app.route("/api/file", methods=["GET"]) : Path Injection
Nov 7th 2024
shyun020
•
duplicate
Critical
Arbitrary File Download vulnerability in rpc_agent_client
Nov 7th 2024
7resp4ss
•
High
•
$450
High
•
$450
•
CVE-2024-8501
CVE-2024-8501
Command injection
Nov 6th 2024
dan-xzero
•
duplicate
Critical
Site-Wide Cross-Site Request Forgery (CSRF)
Nov 6th 2024
0xanis
•
duplicate
High
Remote code execution
Nov 6th 2024
lager1
•
duplicate
Critical
arbitrary json file read
Nov 6th 2024
0xanis
•
duplicate
High
Arbitrary file read in API endpoint `GET /api/file`
Nov 6th 2024
lager1
•
duplicate
High
Local File Inclusion
Nov 6th 2024
0xanis
•
duplicate
High
path traversal in API endpoint `POST /read-examples`
Nov 6th 2024
lager1
•
duplicate
High
Cross origin resource sharing allows interaction from arbitrary origin
Nov 6th 2024
lager1
•
duplicate
Critical
LFI
Nov 6th 2024
dan-xzero
•
duplicate
Critical
CORS can leads to expose the sensitive data
Nov 6th 2024
mnqazi
•
High
•
$450
High
•
$450
•
CVE-2024-8487
CVE-2024-8487
CSRF lead to delete server
Nov 6th 2024
fewword
•
duplicate
Critical
Path traversal leads to view any files in some dirs
Nov 6th 2024
fewword
•
duplicate
High
Local File Inclusion (LFI)
Nov 6th 2024
mnqazi
•
duplicate
Critical
Cross Site Scripting in workstation
Sep 4th 2024
dan-xzero
•
duplicate
Critical
Path Traversal in api `/api/messages/run/<id>`
Nov 6th 2024
kienzx203
•
duplicate
High
Path traversal allows reading json files on the system
Nov 6th 2024
kienzx203
•
duplicate
High
agentscope studio rce
Nov 6th 2024
muzai
•
not applicable
agentscope studio arbitrary file read
Nov 6th 2024
muzai
•
duplicate
Critical
path traversal to read any json file from a directory call ```invoke```
Nov 6th 2024
ranjit-git
•
duplicate
Medium
Path Traversal at API /api/invocation
Nov 6th 2024
tungpentest
•
duplicate
High
read any file from a directory
Aug 22nd 2024
ranjit-git
•
informative
High
Path traversal leads to view any files in some dirs
Nov 6th 2024
fewword
•
duplicate
High
Path traversal leads to view any files
Nov 6th 2024
fewword
•
duplicate
High
remote code execution possible
Aug 22nd 2024
ranjit-git
•
spam
directory traversal to read any local json file
Nov 6th 2024
ranjit-git
•
High
•
$450
High
•
$450
•
CVE-2024-8524
CVE-2024-8524
Reflected XSS at function Workstation
Sep 4th 2024
ngductung
•
informative
High
Use of insecure channels between server and agents
Oct 2nd 2024
lager1
•
informative
High
local file read
Nov 6th 2024
ranjit-git
•
duplicate
High
CSRF due to overly permissive CORS headers
Nov 6th 2024
patrik-ha
•
High
•
$450
High
•
$450
•
CVE-2024-8489
CVE-2024-8489
Os command injection
Aug 8th 2024
kienzx203
•
self closed
Path Traversal in api `/api/file`
Nov 6th 2024
ngductung
•
duplicate
High
Path Traversal in API `/api/file`
Nov 6th 2024
duongli99
•
High
•
$450
High
•
$450
•
CVE-2024-8438
CVE-2024-8438
CRITICAL
$0
HIGH
$0
MEDIUM
$0
LOW
$0