VYPR
Medium severity6.3NVD Advisory· Published Mar 16, 2026· Updated Apr 29, 2026

CVE-2026-4230

CVE-2026-4230

Description

A vulnerability has been found in vanna-ai vanna up to 2.0.2. Affected is the function update_sql of the file src/vanna/legacy/flask/__init__.py of the component Endpoint. Such manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SQL injection in vanna-ai vanna's update_sql endpoint allows arbitrary SQL execution by storing unsanitized SQL in cache and later running it.

The vulnerability resides in the update_sql endpoint within src/vanna/legacy/flask/__init__.py. Unlike other endpoints that apply input validation via is_sql_valid(), this endpoint directly stores the user-supplied SQL into a shared cache without any sanitization or authentication checks [1]. The corresponding run_sql endpoint then retrieves the cached SQL and executes it against the backend database, again without validation, allowing attackers to bypass existing security controls [1].

Exploitation is straightforward: an attacker sends a POST request to /api/v0/update_sql with arbitrary SQL in the JSON body, then immediately calls /api/v0/run_sql with the same cache identifier. The default NoAuth configuration means no credentials are required, enabling remote, unauthenticated attacks [1]. This design flaw circumvents the more limited validations in the generate_sql endpoint and works across all supported database backends.

The impact is severe: an attacker can execute any SQL command, including DROP TABLE, data exfiltration, and – depending on the database – arbitrary file reads (e.g., pg_read_file on PostgreSQL) or remote code execution (e.g., xp_cmdshell on SQL Server) [1]. This vulnerability is considered more dangerous than previously disclosed CVEs (CVE-2024-7764 and CVE-2024-8055) because it requires no LLM manipulation or regex bypass and is 100% deterministic [1].

As of the advisory date, the vendor has not responded to disclosure, and no official patch or workaround has been released [1]. Users of vanna versions up to 2.0.2 are advised to restrict network access to the API, enforce strong authentication, or implement a reverse proxy with SQL injection filtering until a fix is available.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.