In the latest version of vanna-ai/vanna, the `vanna.ask` function is vulnerable to remote code execution due to prompt injection. The root cause is the lack of a sandbox when executing LLM-generated code, allowing an attacker to manipulate the code executed by the `exec` function in `src/vanna/base/base.py`. This vulnerability can be exploited by an attacker to achieve remote code execution on the app backend server, potentially gaining full control of the server.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2024-08-01T21:25:02.677Z

Reserved: 2024-06-10T22:43:12.603Z

Link: CVE-2024-5826

cve-icon Vulnrichment

Updated: 2024-08-01T21:25:02.677Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-06-27T19:15:17.350

Modified: 2024-11-21T09:48:24.490

Link: CVE-2024-5826

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-13T21:07:32Z