Impact
An authentication bypass vulnerability exists in the vanna‑ai vanna Chat API Endpoint v2 where requests to /api/vanna/v2/ can be manipulated without the presence of valid credentials. This flaw, classified as CWE‑287 and CWE‑306, allows an attacker to remotely invoke API functions without authentication, potentially exposing or altering data managed by the service.
Affected Systems
The flaw affects vanna‑ai vanna versions up to and including 2.0.2. Any installation of this product that exposes the /api/vanna/v2/ endpoint is susceptible; the vulnerability is tied to the Chat API component of the vanna software.
Risk and Exploitability
The CVSS score of 6.9 indicates a moderate severity, and the public availability of the exploit combined with a remote attack vector raises the risk of exploitation. EPSS data is not available and the vulnerability is not listed in the CISA KEV catalog, but the absence of authentication is a serious concern that could be leveraged to compromise confidentiality and integrity of data processed by the API. The likelihood of exploitation is increased by the ease of triggering the flaw via simple request manipulation and the lack of a readily available patch at this time.
OpenCVE Enrichment