CVE-2025-1497

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-1497
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-1497.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-1497
Aliases
Published
2025-03-10T14:15:24Z
Modified
2025-03-11T03:00:30.097249Z
Summary
[none]
Details

A vulnerability, that could result in Remote Code Execution (RCE), has been found in PlotAI. Lack of validation of LLM-generated output allows attacker to execute arbitrary Python code. Vendor commented out vulnerable line, further usage of the software requires uncommenting it and thus accepting the risk. The vendor does not plan to release a patch to fix this vulnerability.

References

Affected packages

Git / github.com/mljar/plotai

Affected ranges

Type
GIT
Repo
https://github.com/mljar/plotai
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.0.3
v0.0.4
v0.0.5
v0.0.6