Impact
A flaw in vanna‑ai vanna versions up to 2.0.2 allows an attacker to manipulate the ID argument in the remove_training_data function of src/vanna/legacy/google/bigquery_vector.py, resulting in SQL injection. This vulnerability permits execution of arbitrary SQL statements, potentially compromising data confidentiality and integrity. The associated weaknesses are listed as CWE‑74 and CWE‑89.
Affected Systems
vanna‑ai vanna, all released versions including 1.x and 2.0.2, are affected. No specific sub‑version details beyond 2.0.2 are provided.
Risk and Exploitability
The CVSS score of 6.9 indicates a Medium severity level. The EPSS score is reported as less than 1 %, suggesting a low current exploitation probability. The vulnerability is not recorded in the CISA KEV catalog. Exploitation can be performed remotely through the API that accepts an external ID parameter, and published exploits are available.
OpenCVE Enrichment
Github GHSA