Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-16384 | Aim Vulnerable to Sandbox Escape Leading to Remote Code Execution |
Github GHSA |
GHSA-gp5h-f9c5-8355 | Aim Vulnerable to Sandbox Escape Leading to Remote Code Execution |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 19 Sep 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aimstack
Aimstack aim |
|
| CPEs | cpe:2.3:a:aimstack:aim:*:*:*:*:*:python:*:* | |
| Vendors & Products |
Aimstack
Aimstack aim |
Sun, 01 Jun 2025 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability classified as critical was found in aimhubio aim up to 3.29.1. This vulnerability affects the function RestrictedPythonQuery of the file /aim/storage/query.py of the component run_view Object Handler. The manipulation of the argument Query leads to sandbox issue. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | A vulnerability classified as critical was found in aimhubio aim up to 3.29.1. This vulnerability affects the function RestrictedPythonQuery of the file /aim/storage/query.py of the component run_view Object Handler. The manipulation of the argument Abfrage leads to erweiterte Rechte. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
| Title | aimhubio aim run_view Object query.py RestrictedPythonQuery sandbox | aimhubio aim run_view Object query.py RestrictedPythonQuery privilege escalation |
Thu, 29 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability classified as critical was found in aimhubio aim up to 3.29.1. This vulnerability affects the function RestrictedPythonQuery of the file /aim/storage/query.py of the component run_view Object Handler. The manipulation of the argument Query leads to sandbox issue. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | aimhubio aim run_view Object query.py RestrictedPythonQuery sandbox | |
| Weaknesses | CWE-264 CWE-265 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-06-01T04:39:53.266Z
Reserved: 2025-05-29T08:11:11.324Z
Link: CVE-2025-5321
Updated: 2025-05-29T15:16:36.218Z
Status : Analyzed
Published: 2025-05-29T15:15:34.417
Modified: 2025-09-19T17:17:50.220
Link: CVE-2025-5321
No data.
OpenCVE Enrichment
Updated: 2025-06-24T09:44:15Z
EUVD
Github GHSA