CVE-2026-8319 — A weakness has been identified in aiwaves-cn agents up to
CVE-2026-8319 — A weakness has been identified in aiwaves-cn agents up to e8c4e3c2d19739d3dff59e577d1c97090cc15f59. Affected by this issue is the function recall_relevant_memories_to_working_memory of the file core/cat/looking_glass/stray_cat.py of the component cheshire_cat_core. This manipulation
What This Means For You
- If your environment is affected by CWE-400, CWE-404, review your exposure and prioritize patching based on your environment. Monitor vendor advisories for CVE-2026-8319 updates and patches.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Potential Resource Exhaustion via Stray Cat Vulnerability — CVE-2026-8319
title: Potential Resource Exhaustion via Stray Cat Vulnerability — CVE-2026-8319
id: scw-2026-05-11-ai-1
status: experimental
level: high
description: |
Detects the execution of the 'stray_cat.py' script, which is associated with CVE-2026-8319. This vulnerability in the aiwaves-cn agents can lead to resource consumption and denial of service due to manipulation of the 'recall_relevant_memories_to_working_memory' function. This rule aims to identify the initial exploitation attempt.
author: SCW Feed Engine (AI-generated)
date: 2026-05-11
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-8319/
tags:
- attack.impact
- attack.t1499
logsource:
category: process_creation
detection:
selection:
Image|contains:
- 'stray_cat.py'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-8319 | vulnerability | CVE-2026-8319 |
| CWE-400 | weakness | CWE-400 |
| CWE-404 | weakness | CWE-404 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 11, 2026 at 23:25 UTC |
This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.
Believe this infringes your rights? Submit a takedown request.