Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5321: Permissive Cross-domain Policy with Untrusted Domains in vanna-ai vanna

0
Medium
VulnerabilityCVE-2026-5321cvecve-2026-5321
Published: Thu Apr 02 2026 (04/02/2026, 04:45:11 UTC)
Source: CVE Database V5
Vendor/Project: vanna-ai
Product: vanna

Description

A flaw has been found in vanna-ai vanna up to 2.0.2. Affected by this issue is some unknown functionality of the component FastAPI/Flask Server. Executing a manipulation can lead to permissive cross-domain policy with untrusted domains. The attack can be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 05:23:21 UTC

Technical Analysis

CVE-2026-5321 is a vulnerability identified in the vanna-ai vanna product, specifically in versions 2.0.0 through 2.0.2. The issue arises from a permissive cross-domain policy configuration within the FastAPI/Flask server component, which governs how web resources can be accessed across different domains. This misconfiguration allows untrusted external domains to bypass the same-origin policy, a fundamental web security mechanism designed to prevent malicious cross-site interactions. The vulnerability can be exploited remotely without requiring authentication or user interaction, making it accessible to attackers over the network. The flaw primarily affects the integrity and confidentiality of data by enabling unauthorized cross-origin requests, potentially allowing attackers to perform actions or access data they should not be able to. The vendor was informed early but has not issued any patches or mitigations, and a public exploit is available, increasing the risk of exploitation. The CVSS 4.0 base score is 5.3, indicating a medium severity level due to the combination of network attack vector, low attack complexity, no privileges or user interaction required, but limited impact on availability and integrity. This vulnerability highlights the importance of strict cross-domain policy enforcement in web applications, especially those built on frameworks like FastAPI and Flask, which are widely used for AI and web services.

Potential Impact

The vulnerability allows attackers to bypass cross-origin restrictions, potentially enabling unauthorized access to sensitive data or execution of unauthorized actions via cross-origin requests. This can lead to data leakage, session hijacking, or manipulation of application state, impacting confidentiality and integrity. Although the availability impact is minimal, the ability to interact with the application from untrusted domains can facilitate further attacks such as phishing or credential theft. Organizations relying on affected versions of vanna-ai vanna, especially those integrating AI services into web applications, may face increased risk of data breaches or unauthorized access. The lack of vendor response and available public exploits heighten the urgency and likelihood of exploitation. The medium severity reflects that while the impact is not catastrophic, it can still cause significant harm in environments where sensitive data or critical AI workflows are involved.

Mitigation Recommendations

1. Immediately audit and restrict cross-domain policies in the vanna-ai vanna deployment to allow only trusted domains. 2. Implement strict Content Security Policy (CSP) headers to control resource loading and reduce cross-origin risks. 3. Use server-side validation to verify the origin of requests and reject those from untrusted domains. 4. Monitor network traffic for unusual cross-origin requests that could indicate exploitation attempts. 5. If possible, isolate the vulnerable component behind a firewall or VPN to limit exposure. 6. Consider deploying web application firewalls (WAFs) with rules targeting cross-origin request anomalies. 7. Engage with the vendor or community to track patch releases and apply updates promptly once available. 8. Educate development teams on secure cross-domain configurations and the risks of permissive policies. 9. For critical environments, consider temporary migration to alternative solutions until a fix is released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-04-01T13:00:12.749Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cdf9c0e6bfc5ba1d93594a

Added to database: 4/2/2026, 5:08:16 AM

Last enriched: 4/2/2026, 5:23:21 AM

Last updated: 4/6/2026, 7:44:28 AM

Views: 141

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses