logo

CVE-2024-12366 pandasai

Package

Manager: pip
Name: pandasai
Vulnerable Version: >=0 <=2.4.2

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00745 pctl0.72149

Details

PandasAI interactive prompt function Remote Code Execution (RCE) PandasAI uses an interactive prompt function that is vulnerable to prompt injection and run arbitrary Python code that can lead to Remote Code Execution (RCE) instead of the intended explanation of the natural language processing by the LLM. The security controls of PandasAI (2.4.3 and earlier) fail to distinguish between legitimate and malicious inputs, allowing the attackers to manipulate the system into executing untrusted code, leading to untrusted code execution (RCE), system compromise, or pivoting attacks on connected services.

Metadata

Created: 2025-02-11T15:32:24Z
Modified: 2025-02-11T21:41:47Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/02/GHSA-vv2h-2w3q-3fx7/GHSA-vv2h-2w3q-3fx7.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-vv2h-2w3q-3fx7
Finding: F422
Auto approve: 1