Platform
python
Component
vanna
Fixed in
2.0.1
2.0.2
2.0.3
CVE-2026-5321 affects vanna-ai vanna versions 2.0.0 through 2.0.2. This vulnerability stems from a flaw in the FastAPI/Flask Server component, leading to a permissive cross-domain policy. Successful exploitation allows an attacker to access resources from untrusted domains, potentially exposing sensitive data. A public exploit is available, making this a critical security concern.
The permissive cross-domain policy enabled by CVE-2026-5321 allows an attacker to bypass security restrictions and access resources from domains that should be considered untrusted. This could involve reading sensitive data, modifying configurations, or even executing arbitrary code on the server, depending on the resources accessible through the cross-domain policy. The availability of a public exploit significantly increases the likelihood of exploitation, as attackers can readily leverage it to compromise vulnerable systems. The potential impact extends beyond the immediate server, as attackers could use compromised resources as stepping stones for lateral movement within the network.
CVE-2026-5321 has a public exploit available, indicating a higher probability of exploitation. The vulnerability was disclosed on 2026-04-02. The vendor was contacted but did not respond, which may delay the availability of a patch. The vulnerability’s impact is amplified by the ease of exploitation and the potential for data exposure.
Exploit Status
EPSS
0.01% (0% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2026-5321 is to upgrade to a patched version of vanna-ai vanna. Unfortunately, no specific fixed version is provided in the CVE details. Until a patch is released, consider implementing temporary workarounds such as restricting access to the FastAPI/Flask Server using a Web Application Firewall (WAF) or proxy server. Configure the WAF to block requests from untrusted domains or enforce stricter cross-origin resource sharing (CORS) policies. Carefully review and restrict the resources accessible through the server to minimize the potential impact of a successful exploit. After upgrading, confirm the vulnerability is resolved by attempting to access resources from a known untrusted domain and verifying that the request is denied.
Update the vanna-ai vanna library to a version later than 2.0.2. This will fix the permissive cross-domain policy with untrusted domains. Refer to the vendor's documentation for specific instructions on how to update the library.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2026-5321 is a vulnerability in vanna-ai vanna versions 2.0.0–2.0.2 that allows an attacker to bypass security restrictions and access resources from untrusted domains due to a permissive cross-domain policy.
If you are using vanna-ai vanna versions 2.0.0 through 2.0.2, you are potentially affected by this vulnerability. Upgrade as soon as a patch is available.
The recommended fix is to upgrade to a patched version of vanna-ai vanna. Until a patch is released, implement temporary workarounds like WAF rules or stricter CORS policies.
Yes, a public exploit exists for CVE-2026-5321, indicating a high probability of active exploitation.
Due to the vendor's lack of response, an official advisory may not be available. Monitor security news sources and the vanna-ai project's website for updates.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your requirements.txt file and we'll tell you instantly if you're affected.