An arbitrary code execution vulnerability exists in versions 0.2.9 up to 0.5.10 of the Guardrails AI Guardrails framework because of the way it validates XML files. If a victim user loads a maliciously crafted XML file containing Python code, the code will be passed to an eval function, causing it to execute on the user's machine.
{ "nvd_published_at": "2024-09-18T15:15:16Z", "cwe_ids": [ "CWE-95" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2024-09-18T17:39:32Z" }