Skip to content

Commit 12d3f6e

Browse files
1 parent af27159 commit 12d3f6e

1 file changed

Lines changed: 32 additions & 10 deletions

File tree

advisories/unreviewed/2026/02/GHSA-hg58-x52p-859c/GHSA-hg58-x52p-859c.json renamed to advisories/github-reviewed/2026/02/GHSA-hg58-x52p-859c/GHSA-hg58-x52p-859c.json

Lines changed: 32 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,35 +1,56 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hg58-x52p-859c",
4-
"modified": "2026-02-23T06:30:18Z",
4+
"modified": "2026-02-25T17:58:36Z",
55
"published": "2026-02-23T06:30:18Z",
66
"aliases": [
77
"CVE-2026-2970"
88
],
9-
"details": "A vulnerability has been found in datapizza-labs datapizza-ai 0.0.2. Affected by this vulnerability is the function RedisCache of the file datapizza-ai-cache/redis/datapizza/cache/redis/cache.py. Such manipulation leads to deserialization. The attack requires being on the local network. A high complexity level is associated with this attack. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
9+
"summary": "datapizza-ai has unsafe deserialization via pickle.loads() in RedisCache",
10+
"details": "A vulnerability has been found in datapizza-labs datapizza-ai 0.0.7. Affected by this vulnerability is the function RedisCache of the file datapizza-ai-cache/redis/datapizza/cache/redis/cache.py. Such manipulation leads to deserialization. The attack requires being on the local network. A high complexity level is associated with this attack. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"
1415
},
1516
{
1617
"type": "CVSS_V4",
17-
"score": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
"score": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"
19+
}
20+
],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "PyPI",
25+
"name": "datapizza-ai-core"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "0"
33+
},
34+
{
35+
"last_affected": "0.0.7"
36+
}
37+
]
38+
}
39+
]
1840
}
1941
],
20-
"affected": [],
2142
"references": [
2243
{
2344
"type": "ADVISORY",
2445
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2970"
2546
},
2647
{
27-
"type": "WEB",
28-
"url": "https://github.com/hacktivesec/datapizza-ai-disclosure/blob/main/unsafe-deserialization.md"
48+
"type": "PACKAGE",
49+
"url": "https://github.com/datapizza-labs/datapizza-ai"
2950
},
3051
{
3152
"type": "WEB",
32-
"url": "https://github.com/hacktivesec/datapizza-ai-disclosure/blob/main/unsafe-deserialization.md#poc"
53+
"url": "https://github.com/hacktivesec/datapizza-ai-disclosure/blob/main/unsafe-deserialization.md"
3354
},
3455
{
3556
"type": "WEB",
@@ -46,11 +67,12 @@
4667
],
4768
"database_specific": {
4869
"cwe_ids": [
49-
"CWE-20"
70+
"CWE-20",
71+
"CWE-502"
5072
],
5173
"severity": "LOW",
52-
"github_reviewed": false,
53-
"github_reviewed_at": null,
74+
"github_reviewed": true,
75+
"github_reviewed_at": "2026-02-25T17:58:36Z",
5476
"nvd_published_at": "2026-02-23T05:16:20Z"
5577
}
5678
}

0 commit comments

Comments
 (0)