Safety vulnerability ID: 72296
The information on this page was manually curated by our Cybersecurity Intelligence Team.
RAIL documents are an XML-based format invented by Guardrails AI to enforce formatting checks on LLM outputs. Guardrails users that consume RAIL documents from external sources are vulnerable to XXE, which may cause leakage of internal file data via the SYSTEM entity.
Latest version: 0.6.1
Adding guardrails to large language models.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application