CVE-2024-12366 – pandasai
Package
Manager: pip
Name: pandasai
Vulnerable Version: >=0 <=2.4.2
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00745 pctl0.72149
Details
PandasAI interactive prompt function Remote Code Execution (RCE) PandasAI uses an interactive prompt function that is vulnerable to prompt injection and run arbitrary Python code that can lead to Remote Code Execution (RCE) instead of the intended explanation of the natural language processing by the LLM. The security controls of PandasAI (2.4.3 and earlier) fail to distinguish between legitimate and malicious inputs, allowing the attackers to manipulate the system into executing untrusted code, leading to untrusted code execution (RCE), system compromise, or pivoting attacks on connected services.
Metadata
Created: 2025-02-11T15:32:24Z
Modified: 2025-02-11T21:41:47Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/02/GHSA-vv2h-2w3q-3fx7/GHSA-vv2h-2w3q-3fx7.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-vv2h-2w3q-3fx7
Finding: F422
Auto approve: 1