Description
A vulnerability was identified in Sinaptik AI PandasAI up to 0.1.4. Affected by this issue is the function delete_question_and_answers/delete_docs/update_question_answer/update_docs/get_relevant_question_answers_by_id/get_relevant_docs_by_id of the file extensions/ee/vectorstores/lancedb/pandasai_lancedb/lancedb.py of the component pandasai-lancedb Extension. Such manipulation leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-28
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Patch Now
AI Analysis

Impact

The vulnerability permits attackers to inject arbitrary SQL commands into the database when invoking certain PandasAI functions from the pandasai-lancedb Extension. This flaw can lead to unauthorized data retrieval, modification, or deletion, potentially compromising confidentiality, integrity, and availability of the underlying data store. The weakness is a classic SQL injection, as identified by CWE-74 and CWE-89.

Affected Systems

Sinaptik AI's PandasAI library versions up to 0.1.4 are affected. The flaw resides in the functions delete_question_and_answers, delete_docs, update_question_answer, update_docs, get_relevant_question_answers_by_id, and get_relevant_docs_by_id within extensions/ee/vectorstores/lancedb/pandasai_lancedb/lancedb.py of the pandasai-lancedb Extension. Users running these components on any platform that connects to a database through the Extension are at risk.

Risk and Exploitability

The CVSS base score of 6.9 indicates a medium severity vulnerability. No EPSS score is available, but the advisory notes that the exploit is publicly available and can be launched remotely, making it a realistic threat. The vulnerability is not listed in the CISA KEV catalog, yet the presence of an open public exploit increases the likelihood of exploitation via the exposed web endpoints that call the vulnerable functions. Attackers could craft malicious payloads to manipulate SQL queries executed by the Extension.

Generated by OpenCVE AI on March 28, 2026 at 12:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PandasAI to a patched version that fixes the SQL injection in the pandasai-lancedb Extension (e.g., 0.1.5 or later if available).
  • If an upgrade is not immediately possible, disable or remove the pandasai-lancedb Extension from the application until a fix is released.
  • Apply input validation or use parameterized queries in the affected code paths as a temporary control.
  • Contact Sinaptik AI to verify the availability of an official patch or to seek guidance on mitigating the issue.

Generated by OpenCVE AI on March 28, 2026 at 12:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Sinaptik Ai
Sinaptik Ai pandasai
Vendors & Products Sinaptik Ai
Sinaptik Ai pandasai

Sat, 28 Mar 2026 11:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Sinaptik AI PandasAI up to 0.1.4. Affected by this issue is the function delete_question_and_answers/delete_docs/update_question_answer/update_docs/get_relevant_question_answers_by_id/get_relevant_docs_by_id of the file extensions/ee/vectorstores/lancedb/pandasai_lancedb/lancedb.py of the component pandasai-lancedb Extension. Such manipulation leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Sinaptik AI PandasAI pandasai-lancedb Extension lancedb.py get_relevant_docs_by_id sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Sinaptik Ai Pandasai
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-30T18:26:49.399Z

Reserved: 2026-03-27T13:48:08.116Z

Link: CVE-2026-4996

cve-icon Vulnrichment

Updated: 2026-03-30T18:26:46.162Z

cve-icon NVD

Status : Deferred

Published: 2026-03-28T12:16:04.150

Modified: 2026-04-24T16:36:24.067

Link: CVE-2026-4996

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T06:59:28Z

Weaknesses