Home » Database

AVID-2026-R1534

Description

Vulnerability CVE-2024-45846

Details

An arbitrary code execution vulnerability exists in versions 23.10.3.0 up to 24.7.4.1 of the MindsDB platform, when the Weaviate integration is installed on the server. If a specially crafted ‘SELECT WHERE’ clause containing Python code is run against a database created with the Weaviate engine, the code will be passed to an eval function and executed on the server.

Reason for inclusion in AVID: The CVE describes an arbitrary code execution vulnerability in the MindsDB platform (with Weaviate integration) that can be exploited via a crafted SQL-like clause to execute Python code on the server. This is an issue within AI-related software used to build/deploy AI models and serve AI workloads, i.e., part of the AI software stack. It affects the runtime/serving components and dependencies used to run general-purpose AI systems, representing a software supply-chain vulnerability in AI systems. It is a vulnerability type (RCE) with clear security impact.

References

Affected or Relevant Artifacts

  • Developer: mindsdb
  • Deployer: mindsdb
  • Artifact Details:
TypeName
Systemmindsdb

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score8.8
Base Severity🔴 High
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges Required🟢 Low
User InteractionNONE
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-95CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2024-09-12
  • Version: 0.3.3
  • AVID Entry