Impact
An injected SQL command can be executed through the ask function in the vanna legacy base module. This flaw allows an attacker to construct arbitrary SQL statements that are passed directly to the database, which can result in reading, modifying, or deleting data. The vulnerability is classified as a classic SQL Injection (CWE‑74 and CWE‑89).
Affected Systems
The flaw exists in the vanna-ai vanna product up to version 2.0.2. Anyone running that version or any earlier release of the library is vulnerable when the ask function is exposed to user input. All installations using 2.0.2 or earlier must be addressed.
Risk and Exploitability
The CVSS score is 5.3, indicating moderate risk. Exploit code is publicly available and the attack is remotely achievable by supplying crafted input to the ask endpoint. The EPSS score is not available, and the vulnerability is not in CISA’s KEV catalog, but the public proof‑of‑concept material suggests that it could be actively used. Administrators should treat this as a medium‑impact issue that requires timely remediation.
OpenCVE Enrichment