Description
A vulnerability was found in vanna-ai vanna up to 2.0.2. Affected by this vulnerability is the function update_sql/run_sql of the file src/vanna/legacy/flask/__init__.py of the component Endpoint. Performing a manipulation results in server-side request forgery. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-16
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server-Side Request Forgery
Action: Apply Patch
AI Analysis

Impact

A flaw exists in the vanna‑ai vanna library, specifically in the update_sql/run_sql function of the Endpoint module. The vulnerability allows an attacker to cause the server to issue arbitrary HTTP requests, potentially exposing internal network resources or exfiltrating data. This is a classic server‑side request forgery, classified as CWE‑918.

Affected Systems

The affected product is vanna‑ai vanna up to and including version 2.0.2. Any installation that exposes the web Endpoint containing the vulnerable function over a network is at risk. The vulnerability applies regardless of host operating system or hosting environment.

Risk and Exploitability

The CVSS score of 6.9 indicates medium severity, and the EPSS score of less than 1 percent suggests a low probability of widespread exploitation. The likely attack vector is a crafted HTTP request sent to the Endpoint that triggers the vulnerable update_sql/run_sql function; this inference comes from the description that the attack may be initiated remotely. The exploit code is publicly posted and can be used from outside the network. The vulnerability is not recorded in CISA's KEV catalog. Because the server initiates outbound connections, the potential damage depends on the resources the server can reach, making the risk significant for exposed instances.

Generated by OpenCVE AI on March 22, 2026 at 15:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade vanna‑ai vanna to a version newer than 2.0.2 once an official patch becomes available.
  • If a patch is not yet released, restrict external access to the Endpoint by implementing firewall rules or proxy limits to authorized IPs.
  • Configure the server or network to whitelist outbound URLs and block all other destinations, reducing the impact of any further SSRF attempts.
  • Add input validation in the update_sql/run_sql handler to reject URLs with unsafe schemes such as file://, gopher://, or intranet addresses.

Generated by OpenCVE AI on March 22, 2026 at 15:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Vanna-ai
Vanna-ai vanna
Vendors & Products Vanna-ai
Vanna-ai vanna

Mon, 16 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in vanna-ai vanna up to 2.0.2. Affected by this vulnerability is the function update_sql/run_sql of the file src/vanna/legacy/flask/__init__.py of the component Endpoint. Performing a manipulation results in server-side request forgery. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title vanna-ai vanna Endpoint __init__.py run_sql server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-16T16:28:22.159Z

Reserved: 2026-03-15T18:45:11.141Z

Link: CVE-2026-4231

cve-icon Vulnrichment

Updated: 2026-03-16T16:28:16.992Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-16T14:20:16.770

Modified: 2026-03-16T14:53:07.390

Link: CVE-2026-4231

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T07:02:56Z

Weaknesses