Описание
Langroid has WAF Bypass Leading to RCE in TableChatAgent
Affected Scope
langroid <= 0.59.31
Vulnerability Description
CVE-2025-46724 fix bypass:
TableChatAgent can call pandas_eval tool to evaluate the expression. There is a WAF in langroid/utils/pandas_utils.py introduced to block code injection CVE-2025-46724. However it can be bypassed due to _literal_ok() returning False instead of raising UnsafeCommandError on invalid input, combined with unrestricted access to dangerous dunder attributes (__init__, __globals__, __builtins__). This allows chaining whitelisted DataFrame methods to leak the eval builtin and execute arbitrary code.
Reproduction & PoC
This payload is used to bypass the waf, when executed, the column name __import__('os').system('ls')#... will be passed to eval
here is the PoC
after running this poc, command ls will be executed on the server
Gadget
pandas_eval (langroid\agent\special\table_chat_agent.py:239) handle_tool_message (langroid\agent\base.py:2092) handle_message (langroid\agent\base.py:1744) agent_response (langroid\agent\base.py:760) response (langroid\agent\task.py:1584) step (langroid\agent\task.py:1261) run (langroid\agent\task.py:827)
Security Impact
Remote Code Execution (RCE) via pandas_eval tool. Attackers can execute arbitrary shell commands through controlled user input.
Пакеты
langroid
<= 0.59.31
0.59.32
Связанные уязвимости
Langroid is a framework for building large-language-model-powered applications. Prior to version 0.59.32, there is a bypass to the fix for CVE-2025-46724. TableChatAgent can call pandas_eval tool to evaluate the expression. There is a WAF in langroid/utils/pandas_utils.py introduced to block code injection CVE-2025-46724. However it can be bypassed due to _literal_ok() returning False instead of raising UnsafeCommandError on invalid input, combined with unrestricted access to dangerous dunder attributes (__init__, __globals__, __builtins__). This allows chaining whitelisted DataFrame methods to leak the eval builtin and execute arbitrary code. This issue has been patched in version 0.59.32.