Description
A vulnerability has been found in vanna-ai vanna up to 2.0.2. Affected is the function update_sql of the file src/vanna/legacy/flask/__init__.py of the component Endpoint. Such manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-16
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Apply Patch
AI Analysis

Impact

An SQL injection flaw exists in the update_sql function of the Endpoint component in vanna-ai vanna. An attacker can inject arbitrary SQL statements via this endpoint, potentially reading, modifying or deleting data stored in the database. The weakness is cataloged as CWE-74 and CWE-89 and can be exploited remotely without special privileges, allowing unauthorized access to sensitive information and possible disruption of database integrity.

Affected Systems

vanna-ai vanna – versions up to and including 2.0.2 are affected. No later versions are listed as vulnerable.

Risk and Exploitability

The vulnerability has a CVSS score of 5.3, indicating moderate severity. Its EPSS score is below 1%, suggesting a low probability of exploitation in the wild, and it is not listed in the CISA Known Exploited Vulnerabilities catalog. The attack vector is remote, and exploitation requires sending crafted input to the update_sql endpoint. Due to the potential for data compromise, it is advisable to address the issue promptly.

Generated by OpenCVE AI on March 17, 2026 at 11:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the vendor’s website for an updated release that fixes the SQL injection in update_sql; upgrade vanna to a version newer than 2.0.2 once available.
  • If an immediate patch is not available, limit network access to the affected Endpoint or implement network segmentation to restrict reach to the vulnerable service.
  • Apply strict input validation or use parameterized queries to prevent malformed SQL from being executed.
  • Regularly monitor database logs for unexpected queries or suspicious activity and enforce least‑privilege access for database credentials.

Generated by OpenCVE AI on March 17, 2026 at 11:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Vanna-ai
Vanna-ai vanna
Vendors & Products Vanna-ai
Vanna-ai vanna

Mon, 16 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in vanna-ai vanna up to 2.0.2. Affected is the function update_sql of the file src/vanna/legacy/flask/__init__.py of the component Endpoint. Such manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title vanna-ai vanna Endpoint __init__.py update_sql sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-16T16:30:08.379Z

Reserved: 2026-03-15T18:45:08.464Z

Link: CVE-2026-4230

cve-icon Vulnrichment

Updated: 2026-03-16T16:29:54.149Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-16T14:20:16.513

Modified: 2026-03-16T14:53:07.390

Link: CVE-2026-4230

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:45:20Z

Weaknesses