Vulnerability Description
A vulnerability was identified in bagofwords1 bagofwords up to 0.0.297. This impacts the function generate_df of the file backend/app/ai/code_execution/code_execution.py. Such manipulation leads to injection. The attack may be launched remotely. The exploit is publicly available and might be used. Upgrading to version 0.0.298 will fix this issue. The name of the patch is 47b20bcda31264635faff7f6b1c8095abe1861c6. It is recommended to upgrade the affected component.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/Ka7arotto/cve/blob/main/bagofwords-rce.md
- https://github.com/bagofwords1/bagofwords/
- https://github.com/bagofwords1/bagofwords/commit/47b20bcda31264635faff7f6b1c8095
- https://github.com/bagofwords1/bagofwords/issues/60
- https://github.com/bagofwords1/bagofwords/pull/63
- https://github.com/bagofwords1/bagofwords/releases/tag/v0.0.298
- https://vuldb.com/?ctiid.352065
- https://vuldb.com/?id.352065
- https://vuldb.com/?submit.773890
FAQ
What is CVE-2026-4500?
CVE-2026-4500 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability was identified in bagofwords1 bagofwords up to 0.0.297. This impacts the function generate_df of the file backend/app/ai/code_execution/code_execution.py. Such manipulation leads to in...
How severe is CVE-2026-4500?
CVE-2026-4500 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-4500?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.