Description
A vulnerability was identified in bagofwords1 bagofwords up to 0.0.297. This impacts the function generate_df of the file backend/app/ai/code_execution/code_execution.py. Such manipulation leads to injection. The attack may be launched remotely. The exploit is publicly available and might be used. Upgrading to version 0.0.298 will fix this issue. The name of the patch is 47b20bcda31264635faff7f6b1c8095abe1861c6. It is recommended to upgrade the affected component.
Published: 2026-03-20
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution
Action: Apply patch
AI Analysis

Impact

An injection flaw in the generate_df function of bagofwords1 bagofwords permits attackers to inject data that is processed by the backend, allowing remote execution of arbitrary code. The flaw aligns with CWE-74 for input injection and CWE-707 for unsafe handling of user-provided data. Because the exploit is publicly available and can be triggered over the network, an attacker can compromise the entire application if they gain access to the remote interface. The vulnerability can lead to loss of confidentiality and integrity of application data, as well as denial of service if the injected content disrupts normal function.

Affected Systems

bagofwords1 bagofwords versions up to and including 0.0.297 are affected. Updating to version 0.0.298, which contains the referenced patch with commit hash 47b20bcda31264635faff7f6b1c8095abe1861c6, resolves the issue.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and the EPSS score is not available, which does not allow precise quantification of exploitation probability. The vulnerability is not listed in the CISA KEV catalog, but the publicly available exploit and remote attack surface increase the practical risk. Exploitation requires network access to the application and the ability to supply crafted input through the generate_df endpoint, making it a remote exploitation vector.

Generated by OpenCVE AI on March 20, 2026 at 20:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade bagofwords1 bagofwords to version 0.0.298 or later to apply the security patch.

Generated by OpenCVE AI on March 20, 2026 at 20:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Bagofwords1
Bagofwords1 bagofwords
Vendors & Products Bagofwords1
Bagofwords1 bagofwords

Fri, 20 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in bagofwords1 bagofwords up to 0.0.297. This impacts the function generate_df of the file backend/app/ai/code_execution/code_execution.py. Such manipulation leads to injection. The attack may be launched remotely. The exploit is publicly available and might be used. Upgrading to version 0.0.298 will fix this issue. The name of the patch is 47b20bcda31264635faff7f6b1c8095abe1861c6. It is recommended to upgrade the affected component.
Title bagofwords1 bagofwords code_execution.py generate_df injection
Weaknesses CWE-707
CWE-74
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Bagofwords1 Bagofwords
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-24T19:30:36.410Z

Reserved: 2026-03-20T12:38:08.859Z

Link: CVE-2026-4500

cve-icon Vulnrichment

Updated: 2026-03-24T19:30:27.592Z

cve-icon NVD

Status : Deferred

Published: 2026-03-20T20:16:50.450

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-4500

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:34:51Z

Weaknesses