Description
Langroid is a framework for building large-language-model-powered applications. Prior to version 0.59.32, there is a bypass to the fix for CVE-2025-46724. TableChatAgent can call pandas_eval tool to evaluate the expression. There is a WAF in langroid/utils/pandas_utils.py introduced to block code injection CVE-2025-46724. However it can be bypassed due to _literal_ok() returning False instead of raising UnsafeCommandError on invalid input, combined with unrestricted access to dangerous dunder attributes (__init__, __globals__, __builtins__). This allows chaining whitelisted DataFrame methods to leak the eval builtin and execute arbitrary code. This issue has been patched in version 0.59.32.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_confirm
https://github.com/langroid/langroid/security/advisories/GHSA-x34r-63hx-w57f
Vendor Advisory x_refsource_misc
https://github.com/langroid/langroid/security/advisories/GHSA-jqq5-wc57-f8hj
Scores
CVSS v3
9.6
EPSS
0.0002
EPSS Percentile
6.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-94
Status
published
Products (2)
langroid/langroid
< 0.59.32
pypi/langroid
0 - 0.59.32PyPI
Published
Feb 04, 2026
Tracked Since
Feb 18, 2026