Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
4.8

OpenAkita Chat API Endpoint Allows Malicious Command Execution

CVE-2026-3964
Summary

A security issue in OpenAkita's Chat API Endpoint can allow an attacker to execute malicious commands on the system. If left unpatched, an attacker could potentially exploit this issue to gain unauthorized access to your system. Users are advised to update to a fixed version of OpenAkita to mitigate this risk.

Original title
A weakness has been identified in OpenAkita up to 1.24.3. This impacts the function run of the file src/openakita/tools/shell.py of the component Chat API Endpoint. Executing a manipulation of the ...
Original description
A weakness has been identified in OpenAkita up to 1.24.3. This impacts the function run of the file src/openakita/tools/shell.py of the component Chat API Endpoint. Executing a manipulation of the argument Message can lead to os command injection. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
nvd CVSS2.0 4.3
nvd CVSS3.1 5.3
nvd CVSS4.0 4.8
Vulnerability type
CWE-77 Command Injection
CWE-78 OS Command Injection
Published: 11 Mar 2026 · Updated: 14 Mar 2026 · First seen: 11 Mar 2026