VYPR
High severity7.5GHSA Advisory· Published Jul 5, 2024· Updated Apr 15, 2026

CVE-2024-5753

CVE-2024-5753

Description

vanna-ai/vanna version v0.3.4 is vulnerable to SQL injection in some file-critical functions such as pg_read_file(). This vulnerability allows unauthenticated remote users to read arbitrary local files on the victim server, including sensitive files like /etc/passwd, by exploiting the exposed SQL queries via a Python Flask API.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2024-5753 describes an SQL injection in vanna-ai/vanna v0.3.4 allowing unauthenticated remote attackers to read arbitrary files via pg_read_file() through a Flask API.

Vulnerability

Details CVE-2024-5753 affects vanna-ai/vanna version 0.3.4, an open-source tool that converts natural language to SQL queries. The vulnerability is an SQL injection in file-critical functions such as pg_read_file(). This arises because user-supplied input is not properly sanitized before being incorporated into SQL queries executed by the Python Flask API [2].

Exploitation

An unauthenticated remote attacker can exploit this by sending crafted requests to the Flask API. The attacker does not need any prior authentication or special network position; the API endpoint is exposed by default. By injecting SQL commands into parameters that reach pg_read_file(), the attacker can read arbitrary files from the server's filesystem [2].

Impact

Successful exploitation allows the attacker to read sensitive files, including /etc/passwd, database credentials, or configuration files. This can lead to further compromise of the server or lateral movement within the network. The vulnerability does not require any user interaction and has a CVSS v3 score of 7.5 (High) [2].

Mitigation

The vulnerability was reported via a bug bounty program [3]. The vanna project has since evolved to version 2.0, which includes enhanced security measures such as user-aware permissions and row-level security [1]. Users are strongly advised to upgrade to the latest version or apply vendor-provided patches. If upgrading is not possible, restricting network access to the API endpoint can reduce risk.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
vannaPyPI
<= 0.3.4

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.