CVE-2024-53526: Composio: command injection in AI agent tool calls

GHSA-8h93-28hg-fj84 MEDIUM PoC AVAILABLE
Published January 8, 2025
CISO Take

Composio versions 0.5.40–0.6.8 allow OS command injection through the handle_tool_calls function in its OpenAI, Claude, and Julep integrations — any AI agent pipeline using these packages is exposed. Upgrade to 0.6.9 immediately. The CVSS scope change (S:C) means a compromised agent process can pivot to other system components, elevating the real-world impact beyond the base score.

Risk Assessment

Rated medium (CVSS 6.4) but contextually elevated for AI agent deployments. Network-accessible with low privileges required and no user interaction needed. Scope change indicates blast radius extends beyond the vulnerable component. EPSS is low (0.75%) and not in CISA KEV, but composio is widely adopted in agentic AI stacks — the attack surface is material. Organizations running composio-based agents in production should treat this as high urgency.

Affected Systems

Package Ecosystem Vulnerable Range Patched
composio-claude pip >= 0.5.40, < 0.6.9 0.6.9
composio-julep pip >= 0.5.40, < 0.6.9 0.6.9
composio-openai pip >= 0.5.40, < 0.6.9 0.6.9

Severity & Risk

CVSS 3.1
6.4 / 10
EPSS
0.8%
chance of exploitation in 30 days
Higher than 73% of all CVEs
Exploitation Status
Exploit Available
Exploitation: MEDIUM
Sophistication
Trivial
Exploitation Confidence
medium
Public PoC indexed (trickest/cve)
Composite signal derived from CISA KEV, CISA SSVC, EPSS, trickest/cve, and Nuclei templates.

Attack Surface

AV AC PR UI S C I A
AV Network
AC Low
PR Low
UI None
S Changed
C Low
I Low
A None

Recommended Action

5 steps
  1. Upgrade composio-openai, composio-claude, and composio-julep to >= 0.6.9 immediately.

  2. If patching is blocked, restrict network access to services using these packages and implement compensating controls at the network perimeter.

  3. Audit all uses of handle_tool_calls in your codebase for any custom wrappers that may replicate the pattern.

  4. Detect exploitation by monitoring for anomalous subprocess spawning from AI agent processes — unexpected shell invocations, child processes from Python interpreters, or lateral movement from agent hosts.

  5. Apply least-privilege to agent runtime environments to limit blast radius in case of exploitation.

CISA SSVC Assessment

Decision Track
Exploitation none
Automatable No
Technical Impact partial

Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.

Classification

Compliance Impact

This CVE is relevant to:

EU AI Act
Art. 9 - Risk management system
ISO 42001
A.5.5 - AI system supply chain
NIST AI RMF
GOVERN 1.7 - Processes for identifying and managing AI risks across the lifecycle
OWASP LLM Top 10
LLM02 - Insecure Output Handling LLM05 - Supply Chain Vulnerabilities

Frequently Asked Questions

What is CVE-2024-53526?

Composio versions 0.5.40–0.6.8 allow OS command injection through the handle_tool_calls function in its OpenAI, Claude, and Julep integrations — any AI agent pipeline using these packages is exposed. Upgrade to 0.6.9 immediately. The CVSS scope change (S:C) means a compromised agent process can pivot to other system components, elevating the real-world impact beyond the base score.

Is CVE-2024-53526 actively exploited?

Proof-of-concept exploit code is publicly available for CVE-2024-53526, increasing the risk of exploitation.

How to fix CVE-2024-53526?

1. Upgrade composio-openai, composio-claude, and composio-julep to >= 0.6.9 immediately. 2. If patching is blocked, restrict network access to services using these packages and implement compensating controls at the network perimeter. 3. Audit all uses of handle_tool_calls in your codebase for any custom wrappers that may replicate the pattern. 4. Detect exploitation by monitoring for anomalous subprocess spawning from AI agent processes — unexpected shell invocations, child processes from Python interpreters, or lateral movement from agent hosts. 5. Apply least-privilege to agent runtime environments to limit blast radius in case of exploitation.

What systems are affected by CVE-2024-53526?

This vulnerability affects the following AI/ML architecture patterns: agent frameworks, LLM tool-use pipelines, AI orchestration layers, multi-agent systems.

What is the CVSS score for CVE-2024-53526?

CVE-2024-53526 has a CVSS v3.1 base score of 6.4 (MEDIUM). The EPSS exploitation probability is 0.75%.

Technical Details

NVD Description

composio >=0.5.40 is vulnerable to Command Execution in composio_openai, composio_claude, and composio_julep via the handle_tool_calls function.

Exploitation Scenario

An attacker with low-privilege access to an application backed by a composio agent crafts tool call parameters containing shell metacharacters (e.g., semicolons, backticks, or pipe operators). When the LLM returns a tool call response incorporating these inputs, handle_tool_calls passes them unsanitized to command execution. In a more sophisticated chain, an adversary uses indirect prompt injection — embedding malicious instructions into data the LLM ingests (emails, documents, web pages) — causing the LLM itself to generate the malicious tool call payload. From there, the attacker gains arbitrary code execution on the agent host and can pivot to connected services, exfiltrate API keys from environment variables, or establish persistence.

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Timeline

Published
January 8, 2025
Last Modified
January 31, 2025
First Seen
March 24, 2026

Related Vulnerabilities