CVE-2026-35002: Agno is vulnerable to Eval Injection
(updated )
Agno versions prior to 2.3.24 contain an arbitrary code execution vulnerability in the model execution component that allows attackers to execute arbitrary Python code by manipulating the field_type parameter passed to eval(). Attackers can influence the field_type value in a FunctionCall to achieve remote code execution.
References
- github.com/advisories/GHSA-77rh-m34w-rv36
- github.com/agno-agi/agno
- github.com/agno-agi/agno/commit/cbf675521d4d2281925a051784a3b94172e56416
- github.com/agno-agi/agno/releases/tag/v2.3.24
- nvd.nist.gov/vuln/detail/CVE-2026-35002
- www.vulncheck.com/advisories/agno-field-type-eval-injection-arbitrary-code-execution
Code Behaviors & Features
Detect and mitigate CVE-2026-35002 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →