Impact
A weakness in the CodeExecutor.execute function of Sinaptik AI’s PandasAI up to version 3.0.0 allows attackers to inject and execute arbitrary code. This is a classic code injection vulnerability, qualified by CWE‑74 (URL Path Traversal or Injection) and CWE‑94 (Improper Syntax Validation). A successful exploitation would give the attacker command execution privileges on the host running the application, potentially compromising confidentiality, integrity, and availability. The CVSS score of 6.9 indicates moderate severity with the potential for serious impact if exploited.
Affected Systems
The affected product is PandasAI from Sinaptik AI, specifically the Chat Message Handler component. All installations using version 3.0.0 or earlier are vulnerable; newer releases are assumed to have resolved the issue. No specific operating system or platform constraints are cited in the advisory.
Risk and Exploitability
The vulnerability can be triggered remotely, and exploitation code has been made publicly available, indicating that attackers could readily craft malicious inputs. With no EPSS value provided, the baseline risk remains moderate but should be treated with urgency. The flaw is not listed in CISA’s KEV catalog but its known public exploit raises the likelihood of real-world attacks. Attackers would target the application’s input interface, feeding crafted payloads that the CodeExecutor executes without adequate validation.
OpenCVE Enrichment