Eval Injection Affecting litdb package, versions [,2.1.9)


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Eval Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-LITDB-13808387
  • published2 Nov 2025
  • disclosed1 Nov 2025
  • creditUnknown

Introduced: 1 Nov 2025

New CVE NOT AVAILABLE CWE-95  (opens in a new tab)

How to fix?

Upgrade litdb to version 2.1.9 or higher.

Overview

litdb is an A literature database tool with GPT integration.

Affected versions of this package are vulnerable to Eval Injection via the parse_schema_dsl function in the extract.py file, which unsafely uses the eval() function. This allows an attacker to execute arbitrary Python code on the server by injecting a malicious Python expression into the user-controlled default_str parameter.

References

CVSS Base Scores

version 4.0
version 3.1