No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sun, 05 Apr 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in premAI-io premsql up to 0.2.1. Affected is the function eval of the file premsql/agents/baseline/workers/followup.py. This manipulation of the argument result causes code injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | premAI-io premsql followup.py eval code injection | |
| Weaknesses | CWE-74 CWE-94 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-05T18:30:14.413Z
Reserved: 2026-04-05T05:12:37.784Z
Link: CVE-2026-5594
No data.
Status : Received
Published: 2026-04-05T19:17:05.437
Modified: 2026-04-05T19:17:05.437
Link: CVE-2026-5594
No data.
OpenCVE Enrichment
No data.