Description
A weakness has been identified in Sinaptik AI PandasAI up to 3.0.0. This vulnerability affects the function CodeExecutor.execute of the file pandasai/core/code_execution/code_executor.py of the component Chat Message Handler. Executing a manipulation can lead to code injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-28
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A weakness in the CodeExecutor.execute function of Sinaptik AI’s PandasAI up to version 3.0.0 allows attackers to inject and execute arbitrary code. This is a classic code injection vulnerability, qualified by CWE‑74 (URL Path Traversal or Injection) and CWE‑94 (Improper Syntax Validation). A successful exploitation would give the attacker command execution privileges on the host running the application, potentially compromising confidentiality, integrity, and availability. The CVSS score of 6.9 indicates moderate severity with the potential for serious impact if exploited.

Affected Systems

The affected product is PandasAI from Sinaptik AI, specifically the Chat Message Handler component. All installations using version 3.0.0 or earlier are vulnerable; newer releases are assumed to have resolved the issue. No specific operating system or platform constraints are cited in the advisory.

Risk and Exploitability

The vulnerability can be triggered remotely, and exploitation code has been made publicly available, indicating that attackers could readily craft malicious inputs. With no EPSS value provided, the baseline risk remains moderate but should be treated with urgency. The flaw is not listed in CISA’s KEV catalog but its known public exploit raises the likelihood of real-world attacks. Attackers would target the application’s input interface, feeding crafted payloads that the CodeExecutor executes without adequate validation.

Generated by OpenCVE AI on March 28, 2026 at 14:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the currently installed version of PandasAI; if it is 3.0.0 or earlier, plan an immediate upgrade to the latest stable release.
  • If an upgrade is not feasible, isolate the application from untrusted input sources or implement strict input validation to prevent code injection before execution.
  • Configure application logging to monitor for anomalous execution attempts and review logs regularly for suspicious activity.

Generated by OpenCVE AI on March 28, 2026 at 14:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Sinaptik Ai
Sinaptik Ai pandasai
Vendors & Products Sinaptik Ai
Sinaptik Ai pandasai

Sat, 28 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Sinaptik AI PandasAI up to 3.0.0. This vulnerability affects the function CodeExecutor.execute of the file pandasai/core/code_execution/code_executor.py of the component Chat Message Handler. Executing a manipulation can lead to code injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title Sinaptik AI PandasAI Chat Message code_executor.py CodeExecutor.execute code injection
Weaknesses CWE-74
CWE-94
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Sinaptik Ai Pandasai
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-30T15:49:24.355Z

Reserved: 2026-03-27T13:48:14.552Z

Link: CVE-2026-4998

cve-icon Vulnrichment

Updated: 2026-03-30T15:49:19.712Z

cve-icon NVD

Status : Deferred

Published: 2026-03-28T14:15:58.987

Modified: 2026-04-24T16:36:24.067

Link: CVE-2026-4998

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T06:59:04Z

Weaknesses