Description

Paperclip is a Node.js server and React UI that orchestrates a team of AI agents to run a business. Prior to version 2026.416.0, an unauthenticated attacker can achieve full remote code execution on any network-accessible Paperclip instance running in `authenticated` mode with default configuration. No user interaction, no credentials, just the target's address. The chain consists of six API calls. The attack is fully automated, requires no user interaction, and works against the default deployment configuration. Version 2026.416.0 patches the issue.

INFO

Published Date :

2026-04-23T00:53:16.391Z

Last Modified :

2026-04-23T16:23:25.939Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-41679 vulnerability.

Vendors Products
Paperclip
  • Paperclipai
  • Paperclipai/server
  • Paperclipai\/server
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-41679.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact