9.8 CVE-2025-46724

Patch Exploit
 

Langroid is a Python framework to build large language model (LLM)-powered applications. Prior to version 0.53.15, `TableChatAgent` uses `pandas eval()`. If fed by untrusted user input, like the case of a public-facing LLM application, it may be vulnerable to code injection. Langroid 0.53.15 sanitizes input to `TableChatAgent` by default to tackle the most common attack vectors, and added several warnings about the risky behavior in the project documentation.
https://nvd.nist.gov/vuln/detail/CVE-2025-46724

Categories

CWE-94

References


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:langroid:langroid:*:*:*:*:*:*:*:* < 0.53.15


REMEDIATION


Patch

Url
https://github.com/langroid/langroid/commit/0d9e4a7bb3ae2eef8d38f2e970ff91659...


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url

Other Nist (github, ...)

Url
https://github.com/langroid/langroid/security/advisories/GHSA-jqq5-wc57-f8hj
https://github.com/langroid/langroid/security/advisories/GHSA-jqq5-wc57-f8hj


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
No entry