Description
In the latest version of vanna-ai/vanna, the `vanna.ask` function is vulnerable to remote code execution due to prompt injection. The root cause is the lack of a sandbox when executing LLM-generated code, allowing an attacker to manipulate the code executed by the `exec` function in `src/vanna/base/base.py`. This vulnerability can be exploited by an attacker to achieve remote code execution on the app backend server, potentially gaining full control of the server.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2162 | In the latest version of vanna-ai/vanna, the `vanna.ask` function is vulnerable to remote code execution due to prompt injection. The root cause is the lack of a sandbox when executing LLM-generated code, allowing an attacker to manipulate the code executed by the `exec` function in `src/vanna/base/base.py`. This vulnerability can be exploited by an attacker to achieve remote code execution on the app backend server, potentially gaining full control of the server. |
Github GHSA |
GHSA-rrqq-fv6m-692m | vanna vulnerable to remote code execution caused by prompt injection |
References
History
No history.
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-10-15T12:50:29.876Z
Reserved: 2024-06-10T22:43:12.603Z
Link: CVE-2024-5826
Updated: 2024-08-01T21:25:02.677Z
Status : Awaiting Analysis
Published: 2024-06-27T19:15:17.350
Modified: 2024-11-21T09:48:24.490
Link: CVE-2024-5826
No data.
OpenCVE Enrichment
Updated: 2025-07-13T21:07:32Z
Weaknesses
EUVD
Github GHSA