Impact
A flaw exists in the vanna‑ai vanna library, specifically in the update_sql/run_sql function of the Endpoint module. The vulnerability allows an attacker to cause the server to issue arbitrary HTTP requests, potentially exposing internal network resources or exfiltrating data. This is a classic server‑side request forgery, classified as CWE‑918.
Affected Systems
The affected product is vanna‑ai vanna up to and including version 2.0.2. Any installation that exposes the web Endpoint containing the vulnerable function over a network is at risk. The vulnerability applies regardless of host operating system or hosting environment.
Risk and Exploitability
The CVSS score of 6.9 indicates medium severity, and the EPSS score of less than 1 percent suggests a low probability of widespread exploitation. The likely attack vector is a crafted HTTP request sent to the Endpoint that triggers the vulnerable update_sql/run_sql function; this inference comes from the description that the attack may be initiated remotely. The exploit code is publicly posted and can be used from outside the network. The vulnerability is not recorded in CISA's KEV catalog. Because the server initiates outbound connections, the potential damage depends on the resources the server can reach, making the risk significant for exposed instances.
OpenCVE Enrichment