Impact
The vulnerability resides in the eval() usage within the followup.py component of premAI-io premsql. An attacker can supply crafted input that is executed by eval, allowing arbitrary Python code to run on the host that runs the application. This results in remote code execution, enabling full control over affected systems. The weakness aligns with CWE-74 and CWE-94.
Affected Systems
The issue impacts premAI-io premsql versions up to 0.2.1. Any deployment of this package that includes the followup.py worker is potentially vulnerable.
Risk and Exploitability
The CVSS base score is 5.3, indicating moderate severity, and the vulnerability is not listed in the CISA KEV catalog. Public proof‑of‑concept code demonstrates that the exploit is feasible, and the attack vector is remote. An attacker who can reach the application can inject code through the eval call and compromise the entire system with no additional privileges.
OpenCVE Enrichment