Impact
The flaw resides in the ChatPromptTemplate function of datapizza‑ai‑core and allows an attacker to manipulate the Prompt argument used by the Jinja2 template engine. This improper neutralization of special elements results in a server‑side template injection that can lead to remote code execution. The weakness aligns with CWE‑1336 and CWE‑791.
Affected Systems
Affected systems are installations of datapizza‑labs datapizza‑ai version 0.0.2. No other versions or products are listed, and the impact is limited to that particular release.
Risk and Exploitability
The vulnerability carries a CVSS score of 5.1 and an EPSS score below 1 %, indicating a modest severity with a very low likelihood of exploitation. It is not currently listed in the CISA KEV catalog. However, the description confirms that exploitation is possible from a remote source, and proof‑of‑concept code has been published, suggesting that an attacker could supply a crafted Prompt string to execute arbitrary code on the server.
OpenCVE Enrichment
Github GHSA