Arbitrary Code Injection Affecting langroid package, versions [,0.53.15)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (20th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-LANGROID-10361596
  • published16 Jun 2025
  • disclosed20 May 2025
  • creditUnknown

Introduced: 20 May 2025

NewCVE-2025-46724  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade langroid to version 0.53.15 or higher.

Overview

langroid is a Harness LLMs with Multi-Agent Programming

Affected versions of this package are vulnerable to Arbitrary Code Injection due to the use of pandas eval() function. An attacker can execute arbitrary code by supplying malicious input to this function. This is only exploitable if the application is public-facing and accepts user input directly into the TableChatAgent.

References

CVSS Base Scores

version 4.0
version 3.1