Логотип exploitDog
bind:CVE-2026-25481
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-25481

Количество 2

Количество 2

nvd логотип

CVE-2026-25481

4 дня назад

Langroid is a framework for building large-language-model-powered applications. Prior to version 0.59.32, there is a bypass to the fix for CVE-2025-46724. TableChatAgent can call pandas_eval tool to evaluate the expression. There is a WAF in langroid/utils/pandas_utils.py introduced to block code injection CVE-2025-46724. However it can be bypassed due to _literal_ok() returning False instead of raising UnsafeCommandError on invalid input, combined with unrestricted access to dangerous dunder attributes (__init__, __globals__, __builtins__). This allows chaining whitelisted DataFrame methods to leak the eval builtin and execute arbitrary code. This issue has been patched in version 0.59.32.

EPSS: Низкий
github логотип

GHSA-x34r-63hx-w57f

6 дней назад

Langroid has WAF Bypass Leading to RCE in TableChatAgent

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-25481

Langroid is a framework for building large-language-model-powered applications. Prior to version 0.59.32, there is a bypass to the fix for CVE-2025-46724. TableChatAgent can call pandas_eval tool to evaluate the expression. There is a WAF in langroid/utils/pandas_utils.py introduced to block code injection CVE-2025-46724. However it can be bypassed due to _literal_ok() returning False instead of raising UnsafeCommandError on invalid input, combined with unrestricted access to dangerous dunder attributes (__init__, __globals__, __builtins__). This allows chaining whitelisted DataFrame methods to leak the eval builtin and execute arbitrary code. This issue has been patched in version 0.59.32.

0%
Низкий
4 дня назад
github логотип
GHSA-x34r-63hx-w57f

Langroid has WAF Bypass Leading to RCE in TableChatAgent

0%
Низкий
6 дней назад

Уязвимостей на страницу