CVE-2024-5753
Description
vanna-ai/vanna version v0.3.4 is vulnerable to SQL injection in some file-critical functions such as pg_read_file(). This vulnerability allows unauthenticated remote users to read arbitrary local files on the victim server, including sensitive files like /etc/passwd, by exploiting the exposed SQL queries via a Python Flask API.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2024-5753 describes an SQL injection in vanna-ai/vanna v0.3.4 allowing unauthenticated remote attackers to read arbitrary files via pg_read_file() through a Flask API.
Vulnerability
Details CVE-2024-5753 affects vanna-ai/vanna version 0.3.4, an open-source tool that converts natural language to SQL queries. The vulnerability is an SQL injection in file-critical functions such as pg_read_file(). This arises because user-supplied input is not properly sanitized before being incorporated into SQL queries executed by the Python Flask API [2].
Exploitation
An unauthenticated remote attacker can exploit this by sending crafted requests to the Flask API. The attacker does not need any prior authentication or special network position; the API endpoint is exposed by default. By injecting SQL commands into parameters that reach pg_read_file(), the attacker can read arbitrary files from the server's filesystem [2].
Impact
Successful exploitation allows the attacker to read sensitive files, including /etc/passwd, database credentials, or configuration files. This can lead to further compromise of the server or lateral movement within the network. The vulnerability does not require any user interaction and has a CVSS v3 score of 7.5 (High) [2].
Mitigation
The vulnerability was reported via a bug bounty program [3]. The vanna project has since evolved to version 2.0, which includes enhanced security measures such as user-aware permissions and row-level security [1]. Users are strongly advised to upgrade to the latest version or apply vendor-provided patches. If upgrading is not possible, restricting network access to the API endpoint can reduce risk.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
vannaPyPI | <= 0.3.4 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.