9.8 CVE-2025-46724
Patch Exploit
Langroid is a Python framework to build large language model (LLM)-powered applications. Prior to version 0.53.15, `TableChatAgent` uses `pandas eval()`. If fed by untrusted user input, like the case of a public-facing LLM application, it may be vulnerable to code injection. Langroid 0.53.15 sanitizes input to `TableChatAgent` by default to tackle the most common attack vectors, and added several warnings about the risky behavior in the project documentation.
https://nvd.nist.gov/vuln/detail/CVE-2025-46724
Categories
CWE-94
References
134c704f-9b21-4f2e-91b3-4a467353bcc0 Exploit
| https://github.com/langroid/langroid/security/advisories/GHSA-jqq5-wc57-f8hj Exploit Vendor Advisory |
security-advisories@github.com Patch Exploit
CPE
| cpe | start | end |
|---|---|---|
| Configuration 1 | ||
| cpe:2.3:a:langroid:langroid:*:*:*:*:*:*:*:* | < 0.53.15 | |
REMEDIATION
Patch
| Url |
|---|
| https://github.com/langroid/langroid/commit/0d9e4a7bb3ae2eef8d38f2e970ff91659... |
EXPLOITS
Exploit-db.com
| id | description | date | |
|---|---|---|---|
| No known exploits | |||
POC Github
| Url |
|---|
Other Nist (github, ...)
| Url |
|---|
| https://github.com/langroid/langroid/security/advisories/GHSA-jqq5-wc57-f8hj |
| https://github.com/langroid/langroid/security/advisories/GHSA-jqq5-wc57-f8hj |
CAPEC
Common Attack Pattern Enumerations and Classifications
| id | description | severity |
|---|---|---|
| No entry | ||
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
