Plattform
python
Komponente
langroid
Behoben in
0.53.16
0.53.15
CVE-2025-46725 is a remote code execution (RCE) vulnerability affecting Langroid versions up to 0.9.5. This flaw arises from the use of pandas eval() within the LanceDocChatAgent, allowing attackers to inject malicious commands. A fix is available in Langroid 0.53.15, and users are strongly advised to upgrade immediately to prevent potential compromise.
The vulnerability lies in the LanceDocChatAgent component of Langroid, specifically within the computefromdocs() function which utilizes pandas eval(). An attacker can craft malicious input that, when processed by the agent, will be executed as code on the host system. This could lead to arbitrary command execution, allowing the attacker to gain control of the system, steal sensitive data, or install malware. The blast radius extends to any data processed by the Langroid agent, and successful exploitation could lead to complete system compromise.
CVE-2025-46725 was published on 2025-05-20. There is currently no indication of active exploitation or listing on KEV. The EPSS score is pending evaluation. Public proof-of-concept code is not yet available, but the vulnerability's nature makes it likely that one will emerge.
Organizations deploying Langroid agents for document processing or chatbot applications are at risk. This includes developers integrating Langroid into their applications and users relying on Langroid for data analysis or information retrieval. Environments where Langroid agents have access to sensitive data or critical systems are particularly vulnerable.
• python / server:
Get-Process -Name python | Where-Object {$_.CPU -gt 10} # Monitor Python processes with high CPU usage• python / server:
Get-WinEvent -LogName Application -Filter "EventID=4688 -MessageText='pandas.core.eval'" # Check for process creation events involving pandas• python / server: Monitor Python logs for unusual function calls or error messages related to pandas eval().
• python / server: Review Langroid configuration files for any unusual or unexpected input sources.
disclosure
Exploit-Status
EPSS
0.41% (61% Perzentil)
CISA SSVC
The primary mitigation is to upgrade Langroid to version 0.53.15 or later, which includes input sanitization to prevent malicious code execution. If upgrading is not immediately feasible, consider isolating the Langroid agent from sensitive data and restricting its network access. While a WAF might offer some protection, it's unlikely to be effective against this type of injection without specific rules tailored to the pandas eval() function. There are no specific Sigma or YARA rules available at this time, but monitoring for unusual process execution related to pandas or Python is recommended.
Actualice la biblioteca Langroid a la versión 0.53.15 o superior. Esto corrige la vulnerabilidad de inyección de código. Puede actualizar usando `pip install langroid --upgrade`.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-46725 is a remote code execution vulnerability in Langroid versions up to 0.9.5, allowing attackers to execute arbitrary code through the pandas eval() function.
You are affected if you are using Langroid version 0.9.5 or earlier. Upgrade to version 0.53.15 or later to resolve the vulnerability.
Upgrade Langroid to version 0.53.15 or later. This version includes input sanitization to prevent malicious code execution.
There is currently no evidence of active exploitation, but the vulnerability's nature makes it a potential target.
Refer to the Langroid GitHub repository for updates and advisories: https://github.com/langroid/langroid
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine requirements.txt-Datei hoch und wir sagen dir sofort, ob du betroffen bist.