Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2970: Deserialization in datapizza-labs datapizza-ai

0
Low
VulnerabilityCVE-2026-2970cvecve-2026-2970
Published: Mon Feb 23 2026 (02/23/2026, 04:02:10 UTC)
Source: CVE Database V5
Vendor/Project: datapizza-labs
Product: datapizza-ai

Description

A vulnerability has been found in datapizza-labs datapizza-ai 0.0.2. Affected by this vulnerability is the function RedisCache of the file datapizza-ai-cache/redis/datapizza/cache/redis/cache.py. Such manipulation leads to deserialization. The attack requires being on the local network. A high complexity level is associated with this attack. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/02/2026, 06:34:36 UTC

Technical Analysis

CVE-2026-2970 identifies a deserialization vulnerability in the datapizza-ai product version 0.0.2 developed by datapizza-labs. The flaw exists in the RedisCache function located in the file datapizza-ai-cache/redis/datapizza/cache/redis/cache.py. Deserialization vulnerabilities occur when untrusted data is processed by an application’s deserialization mechanism, potentially allowing attackers to execute arbitrary code or manipulate application state. In this case, the vulnerability requires the attacker to be on the same local network as the target system, which limits the attack surface. The attack complexity is high, indicating that exploitation requires significant skill or specific conditions. The CVSS 4.0 vector indicates attack vector as adjacent network (AV:A), high attack complexity (AC:H), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vendor was notified early but has not responded or issued a patch, and no public exploits are known to be actively used. This vulnerability could allow an attacker with local network access to manipulate the deserialization process in RedisCache, potentially leading to unauthorized code execution or data corruption within the datapizza-ai environment. However, the difficulty of exploitation and limited access requirements reduce the overall risk.

Potential Impact

The potential impact of CVE-2026-2970 is relatively low due to the high complexity of exploitation and the requirement for local network access. If exploited, an attacker could manipulate the deserialization process in the RedisCache function, possibly leading to unauthorized code execution or data manipulation within the datapizza-ai application. This could compromise the confidentiality, integrity, and availability of data managed by datapizza-ai. However, since the affected version is an early release (0.0.2) and the attack vector is limited to adjacent networks, the scope of affected systems is narrow. Organizations running datapizza-ai in sensitive or critical environments where local network access is possible should consider the risk more seriously, especially if the application handles sensitive data or is integrated into larger systems. The lack of vendor response and absence of patches increase the risk of future exploitation attempts once the vulnerability becomes better understood or automated exploit tools are developed.

Mitigation Recommendations

Given the absence of an official patch or vendor response, organizations should implement specific mitigations to reduce risk. First, restrict local network access to systems running datapizza-ai 0.0.2 by enforcing strict network segmentation and access controls, limiting who can connect to the local network segment hosting the application. Second, monitor network traffic for unusual or unauthorized Redis commands or deserialization-related anomalies that could indicate exploitation attempts. Third, consider disabling or replacing the RedisCache functionality if feasible, or upgrading to a later version of datapizza-ai if available and confirmed not vulnerable. Fourth, implement application-level input validation and sanitization to prevent malicious data from reaching the deserialization process. Finally, maintain vigilant monitoring for any new advisories or patches from datapizza-labs or security communities and apply updates promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-22T08:12:14.812Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699bd4c9be58cf853b2b9049

Added to database: 2/23/2026, 4:17:13 AM

Last enriched: 3/2/2026, 6:34:36 AM

Last updated: 4/9/2026, 3:55:56 AM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses