Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1479 | The Vanna library uses a prompt function to present the user with visualized results, it is possible to alter the prompt using prompt injection and run arbitrary Python code instead of the intended visualization code. Specifically - allowing external input to the library’s “ask” method with "visualize" set to True (default behavior) leads to remote code execution. |
Github GHSA |
GHSA-7735-w2jp-gvg6 | Vanna prompt injection code execution |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 25 Nov 2024 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vanna-ai
Vanna-ai vanna |
|
| CPEs | cpe:2.3:a:vanna-ai:vanna:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Vanna-ai
Vanna-ai vanna |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2024-11-25T12:52:55.405Z
Reserved: 2024-05-31T13:56:13.026Z
Link: CVE-2024-5565
Updated: 2024-08-01T21:18:06.558Z
Status : Deferred
Published: 2024-05-31T15:15:09.673
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-5565
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA