Skip to content
CVSS 7.3 · HIGH

CVE-2026-6977

A security vulnerability has been detected in vanna-ai vanna up to 2.0.2. The affected element is an unknown function of the component Legacy Flask API. The manipulation leads to improper authorization. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Ver en NVD

Análisis

Vanna, a Python framework for RAG-based SQL generation, contains an improper authorization vulnerability in its legacy Flask API component. An attacker could potentially exploit this remotely, though the impact is limited to applications using the specific legacy API of this library.

Severidad

Puntaje: 7.3(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: LOW
I: LOW
A: LOW
Tipo de falla (CWE): CWE-266CWE-285

EPSS

Probabilidad de explotación (próx. 30 días): 0.0005 (0.1%)
Percentil: 15.2%
EPSS: 2026-05-06

Descripción técnica

A security vulnerability has been detected in vanna-ai vanna up to 2.0.2. The affected element is an unknown function of the component Legacy Flask API. The manipulation leads to improper authorization. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Publicada: 25/4/2026, 11:16:19
Última modificación: 29/4/2026, 1:00:01

Referencias

InicioEventosBlogRecursosEquipo