Vulnerability Description
Langroid is a Python framework to build large language model (LLM)-powered applications. Prior to version 0.53.15, `TableChatAgent` uses `pandas eval()`. If fed by untrusted user input, like the case of a public-facing LLM application, it may be vulnerable to code injection. Langroid 0.53.15 sanitizes input to `TableChatAgent` by default to tackle the most common attack vectors, and added several warnings about the risky behavior in the project documentation.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Langroid | Langroid | < 0.53.15 |
Related Weaknesses (CWE)
References
- https://github.com/langroid/langroid/commit/0d9e4a7bb3ae2eef8d38f2e970ff916599a2Patch
- https://github.com/langroid/langroid/security/advisories/GHSA-jqq5-wc57-f8hjExploitVendor Advisory
- https://github.com/langroid/langroid/security/advisories/GHSA-jqq5-wc57-f8hjExploitVendor Advisory
FAQ
What is CVE-2025-46724?
CVE-2025-46724 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Langroid is a Python framework to build large language model (LLM)-powered applications. Prior to version 0.53.15, `TableChatAgent` uses `pandas eval()`. If fed by untrusted user input, like the case ...
How severe is CVE-2025-46724?
CVE-2025-46724 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-46724?
Check the references section above for vendor advisories and patch information. Affected products include: Langroid Langroid.