CVE-2026-4500: Injection in bagofwords1 bagofwords
A vulnerability was identified in bagofwords1 bagofwords up to 0.0.297. This impacts the function generate_df of the file backend/app/ai/code_execution/code_execution.py. Such manipulation leads to injection. The attack may be launched remotely. The exploit is publicly available and might be used. Upgrading to version 0.0.298 will fix this issue. The name of the patch is 47b20bcda31264635faff7f6b1c8095abe1861c6. It is recommended to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2026-4500 identifies an injection vulnerability in the bagofwords1 bagofwords software, affecting versions up to 0.0.297. The issue resides in the generate_df function within the backend/app/ai/code_execution/code_execution.py file. Injection vulnerabilities typically occur when untrusted input is improperly handled, allowing attackers to inject malicious code or commands that the application executes. In this case, the vulnerability can be exploited remotely without requiring authentication or user interaction, increasing the attack surface. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L - low privileges), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability does not affect system components (SC:N), and the scope remains unchanged (SI:N). Although no known exploits are currently active in the wild, a public exploit is available, which could facilitate attacks. The vendor has addressed the issue in version 0.0.298, with a patch identified by commit 47b20bcda31264635faff7f6b1c8095abe1861c6. The vulnerability is relevant to environments using bagofwords1 for AI code execution or data frame generation, where injection could lead to unauthorized code execution or data manipulation.
Potential Impact
The injection vulnerability in bagofwords1 bagofwords can lead to unauthorized code execution or manipulation of data frames, potentially compromising the confidentiality, integrity, and availability of affected systems. Since the attack can be launched remotely without user interaction or high privileges, it increases the risk of automated exploitation and widespread impact. Organizations relying on this component in AI workflows or code execution pipelines may face data breaches, corrupted outputs, or service disruptions. Although the impact is rated low to medium per confidentiality, integrity, and availability, the ease of remote exploitation and public availability of an exploit elevate the risk. If exploited in critical environments, such as AI-driven decision-making systems or data processing pipelines, the consequences could include incorrect data analysis, unauthorized access to sensitive information, or denial of service. The lack of known active exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may leverage the public exploit code to develop attacks.
Mitigation Recommendations
To mitigate CVE-2026-4500, organizations should immediately upgrade bagofwords1 bagofwords to version 0.0.298 or later, which contains the official patch fixing the injection vulnerability. Additionally, review and harden input validation and sanitization in the generate_df function and related code execution components to prevent injection of malicious data. Implement network-level protections such as firewalls and intrusion detection systems to monitor and block suspicious remote requests targeting the vulnerable endpoint. Restrict access to the affected service to trusted networks or authenticated users where possible, even though the vulnerability does not require authentication, to reduce exposure. Conduct code audits and penetration testing focused on injection vectors in AI code execution modules. Maintain up-to-date threat intelligence to detect any emerging exploits in the wild. Finally, ensure logging and monitoring are in place to detect anomalous behavior indicative of exploitation attempts.
Affected Countries
United States, Germany, United Kingdom, Canada, France, Japan, South Korea, Australia, Netherlands, India
CVE-2026-4500: Injection in bagofwords1 bagofwords
Description
A vulnerability was identified in bagofwords1 bagofwords up to 0.0.297. This impacts the function generate_df of the file backend/app/ai/code_execution/code_execution.py. Such manipulation leads to injection. The attack may be launched remotely. The exploit is publicly available and might be used. Upgrading to version 0.0.298 will fix this issue. The name of the patch is 47b20bcda31264635faff7f6b1c8095abe1861c6. It is recommended to upgrade the affected component.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-4500 identifies an injection vulnerability in the bagofwords1 bagofwords software, affecting versions up to 0.0.297. The issue resides in the generate_df function within the backend/app/ai/code_execution/code_execution.py file. Injection vulnerabilities typically occur when untrusted input is improperly handled, allowing attackers to inject malicious code or commands that the application executes. In this case, the vulnerability can be exploited remotely without requiring authentication or user interaction, increasing the attack surface. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L - low privileges), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability does not affect system components (SC:N), and the scope remains unchanged (SI:N). Although no known exploits are currently active in the wild, a public exploit is available, which could facilitate attacks. The vendor has addressed the issue in version 0.0.298, with a patch identified by commit 47b20bcda31264635faff7f6b1c8095abe1861c6. The vulnerability is relevant to environments using bagofwords1 for AI code execution or data frame generation, where injection could lead to unauthorized code execution or data manipulation.
Potential Impact
The injection vulnerability in bagofwords1 bagofwords can lead to unauthorized code execution or manipulation of data frames, potentially compromising the confidentiality, integrity, and availability of affected systems. Since the attack can be launched remotely without user interaction or high privileges, it increases the risk of automated exploitation and widespread impact. Organizations relying on this component in AI workflows or code execution pipelines may face data breaches, corrupted outputs, or service disruptions. Although the impact is rated low to medium per confidentiality, integrity, and availability, the ease of remote exploitation and public availability of an exploit elevate the risk. If exploited in critical environments, such as AI-driven decision-making systems or data processing pipelines, the consequences could include incorrect data analysis, unauthorized access to sensitive information, or denial of service. The lack of known active exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may leverage the public exploit code to develop attacks.
Mitigation Recommendations
To mitigate CVE-2026-4500, organizations should immediately upgrade bagofwords1 bagofwords to version 0.0.298 or later, which contains the official patch fixing the injection vulnerability. Additionally, review and harden input validation and sanitization in the generate_df function and related code execution components to prevent injection of malicious data. Implement network-level protections such as firewalls and intrusion detection systems to monitor and block suspicious remote requests targeting the vulnerable endpoint. Restrict access to the affected service to trusted networks or authenticated users where possible, even though the vulnerability does not require authentication, to reduce exposure. Conduct code audits and penetration testing focused on injection vectors in AI code execution modules. Maintain up-to-date threat intelligence to detect any emerging exploits in the wild. Finally, ensure logging and monitoring are in place to detect anomalous behavior indicative of exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-03-20T12:38:08.859Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69bda5ede32a4fbe5fc68a62
Added to database: 3/20/2026, 7:54:21 PM
Last enriched: 3/20/2026, 8:08:49 PM
Last updated: 3/20/2026, 10:43:42 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.