Impact
The vulnerability arises from a prompt injection flaw in the HAI Build Code Generator that causes the language model to incorrectly flag malicious shell instructions as "safe". Attackers can craft prompts that deceive the model into believing a destructive command is harmless, triggering automatic execution without user consent. This weakness is identified as CWE-94, an instance of code injection that permits arbitrary code execution on the host system.
Affected Systems
The affected product is Presidio’s HAI Build Code Generator. All releases incorporating the automatic command‑execution feature are potentially vulnerable, as no specific version data is provided. Users of the tool should assume all current installations are at risk until a fix is applied.
Risk and Exploitability
The CVSS base score of 9.8 marks the flaw as critical, yet the EPSS score of less than 1% indicates that exploitation events are currently rare. The vulnerability is not listed in the CISA KEV catalog, suggesting no confirmed widespread exploitation to date. The likely attack vector, inferred from the description, is a prompt injection via the code‑generation interface, where a crafted user input leads the model to invoke unintended terminal commands.
OpenCVE Enrichment