Impact
The vulnerability is located in a legacy Flask API component of the vanna package. An attacker can manipulate requests to a function that lacks proper authorization checks, allowing them to invoke privileged actions. The vulnerability can be exploited remotely, and the exploit has already been publicly disclosed, meaning an attacker could potentially gain unauthorized access to resources or functionality that should be protected.
Affected Systems
Vendor vanna-ai’s vanna product, versions through 2.0.2, is affected. Users running these versions should review their deployment to confirm the presence of the legacy API endpoint.
Risk and Exploitability
The CVSS score of 6.9 indicates a moderate severity for this improper authorization flaw. An EPSS score of less than 1% suggests a low probability of current exploitation, but the flaw is listed as not being part of the CISA KEV catalog. The attack vector is remote, relying on the ability to send crafted HTTP requests to the exposed legacy endpoint. The flaw could result in unauthorized access, potentially leading to confidentiality or integrity compromise.
OpenCVE Enrichment