Safety vulnerability ID: 72090
The information on this page was manually curated by our Cybersecurity Intelligence Team.
In affected versions, the `vanna.ask` function is vulnerable to remote code execution due to prompt injection. The root cause is the lack of a sandbox when executing LLM-generated code, allowing an attacker to manipulate the code executed by the `exec` function in `src/vanna/base/base.py`. This vulnerability can be exploited by an attacker to achieve remote code execution on the app backend server, potentially gaining full control of the server.
Latest version: 0.7.5
Generate SQL queries from natural language
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application