GHSA-2hmp-5wqg-f24h

Suggest an improvement
Source
https://github.com/advisories/GHSA-2hmp-5wqg-f24h
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-2hmp-5wqg-f24h/GHSA-2hmp-5wqg-f24h.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-2hmp-5wqg-f24h
Aliases
Published
2025-03-10T15:30:47Z
Modified
2025-03-10T22:42:09.293100Z
Severity
  • 9.3 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
PlotAI eval vulnerability
Details

A vulnerability, that could result in Remote Code Execution (RCE), has been found in PlotAI. Lack of validation of LLM-generated output allows attacker to execute arbitrary Python code. PlotAI commented out vulnerable line, further usage of the software requires uncommenting it and thus accepting the risk.

Database specific
{
    "nvd_published_at": "2025-03-10T14:15:24Z",
    "cwe_ids": [
        "CWE-77"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2025-03-10T22:21:12Z"
}
References

Affected packages

PyPI / plotai

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.0.7

Affected versions

0.*

0.0.0
0.0.1
0.0.2
0.0.3
0.0.4
0.0.5
0.0.6