Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-22c2-9gwg-mj59

Опубликовано: 20 мая 2025
Источник: github
Github: Прошло ревью
CVSS4: 8.1

Описание

Langroid has a Code Injection vulnerability in LanceDocChatAgent through vector_store

Summary

LanceDocChatAgent uses pandas eval() through compute_from_docs(): https://github.com/langroid/langroid/blob/18667ec7e971efc242505196f6518eb19a0abc1c/langroid/vector_store/base.py#L136-L150

As a result, an attacker may be able to make the agent run malicious commands through QueryPlan.dataframe_calc compromising the host system.

Fix

Langroid 0.53.15 sanitizes input to the affected function by default to tackle the most common attack vectors, and added several warnings about the risky behavior in the project documentation.

Пакеты

Наименование

langroid

pip
Затронутые версииВерсия исправления

< 0.53.15

0.53.15

EPSS

Процентиль: 20%
0.00062
Низкий

8.1 High

CVSS4

Дефекты

CWE-94

Связанные уязвимости

nvd
около 1 месяца назад

Langroid is a Python framework to build large language model (LLM)-powered applications. Prior to version 0.53.15, `LanceDocChatAgent` uses pandas eval() through `compute_from_docs()`. As a result, an attacker may be able to make the agent run malicious commands through `QueryPlan.dataframe_calc]`) compromising the host system. Langroid 0.53.15 sanitizes input to the affected function by default to tackle the most common attack vectors, and added several warnings about the risky behavior in the project documentation.

EPSS

Процентиль: 20%
0.00062
Низкий

8.1 High

CVSS4

Дефекты

CWE-94