Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vvw2-h478-xwr3 | DSPy does not properly restrict file reads |
Wed, 05 Nov 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jfrog
Jfrog dspy |
|
| Vendors & Products |
Jfrog
Jfrog dspy |
Tue, 04 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 04 Nov 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The overly permissive sandbox configuration in DSPy allows attackers to steal sensitive files in cases when users build an AI agent which consumes user input and uses the “PythonInterpreter” class. | |
| Title | Insecure configuration in DSPy lead to arbitrary file read when running untrusted code inside the sandbox | |
| Weaknesses | CWE-653 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2025-11-04T14:19:33.945Z
Reserved: 2025-11-04T13:05:46.639Z
Link: CVE-2025-12695
Updated: 2025-11-04T14:19:26.090Z
Status : Deferred
Published: 2025-11-04T14:15:34.087
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-12695
No data.
OpenCVE Enrichment
Updated: 2025-11-05T10:47:25Z
Github GHSA