Skip to content

Commit af27159

Browse files
1 parent e27094e commit af27159

1 file changed

Lines changed: 31 additions & 9 deletions

File tree

advisories/unreviewed/2026/02/GHSA-q5xx-fxv3-xxqf/GHSA-q5xx-fxv3-xxqf.json renamed to advisories/github-reviewed/2026/02/GHSA-q5xx-fxv3-xxqf/GHSA-q5xx-fxv3-xxqf.json

Lines changed: 31 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-q5xx-fxv3-xxqf",
4-
"modified": "2026-02-23T06:30:18Z",
4+
"modified": "2026-02-25T17:52:48Z",
55
"published": "2026-02-23T06:30:18Z",
66
"aliases": [
77
"CVE-2026-2969"
88
],
9+
"summary": "datapizza-ai: Server-Side Template Injection in ChatPromptTemplate via Jinja2 Template Handler",
910
"details": "A flaw has been found in datapizza-labs datapizza-ai 0.0.2. Affected is the function ChatPromptTemplate of the file datapizza-ai-core/datapizza/modules/prompt/prompt.py of the component Jinja2 Template Handler. This manipulation of the argument Prompt causes improper neutralization of special elements used in a template engine. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
1011
"severity": [
1112
{
@@ -14,22 +15,42 @@
1415
},
1516
{
1617
"type": "CVSS_V4",
17-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"
19+
}
20+
],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "PyPI",
25+
"name": "datapizza-ai-core"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "0"
33+
},
34+
{
35+
"last_affected": "0.0.2"
36+
}
37+
]
38+
}
39+
]
1840
}
1941
],
20-
"affected": [],
2142
"references": [
2243
{
2344
"type": "ADVISORY",
2445
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2969"
2546
},
2647
{
27-
"type": "WEB",
28-
"url": "https://github.com/hacktivesec/datapizza-ai-disclosure/blob/main/ssti.md"
48+
"type": "PACKAGE",
49+
"url": "https://github.com/datapizza-labs/datapizza-ai"
2950
},
3051
{
3152
"type": "WEB",
32-
"url": "https://github.com/hacktivesec/datapizza-ai-disclosure/blob/main/ssti.md#poc"
53+
"url": "https://github.com/hacktivesec/datapizza-ai-disclosure/blob/main/ssti.md"
3354
},
3455
{
3556
"type": "WEB",
@@ -46,11 +67,12 @@
4667
],
4768
"database_specific": {
4869
"cwe_ids": [
70+
"CWE-1336",
4971
"CWE-791"
5072
],
51-
"severity": "MODERATE",
52-
"github_reviewed": false,
53-
"github_reviewed_at": null,
73+
"severity": "LOW",
74+
"github_reviewed": true,
75+
"github_reviewed_at": "2026-02-25T17:52:48Z",
5476
"nvd_published_at": "2026-02-23T05:16:19Z"
5577
}
5678
}

0 commit comments

Comments
 (0)