Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-28744 | pyspur Incomplete Filtering of Special Elements allowed by SingleLLMCallNode function |
Github GHSA |
GHSA-8gff-cf92-72pv | pyspur Incomplete Filtering of Special Elements allowed by SingleLLMCallNode function |
Mon, 23 Jun 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Jun 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in PySpur-Dev pyspur up to 0.1.18. It has been classified as critical. Affected is the function SingleLLMCallNode of the file backend/pyspur/nodes/llm/single_llm_call.py of the component Jinja2 Template Handler. The manipulation of the argument user_message leads to improper neutralization of special elements used in a template engine. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |
| Title | PySpur-Dev pyspur Jinja2 Template single_llm_call.py SingleLLMCallNode special elements used in a template engine | |
| Weaknesses | CWE-1336 CWE-791 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-06-23T19:25:40.707Z
Reserved: 2025-06-23T12:26:37.952Z
Link: CVE-2025-6518
Updated: 2025-06-23T19:25:30.011Z
Status : Deferred
Published: 2025-06-23T19:15:25.007
Modified: 2026-04-29T01:00:01.613
Link: CVE-2025-6518
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA