CVE-2024-45849
Python vulnerability analysis and mitigation

Overview

An arbitrary code execution vulnerability exists in versions 23.10.5.0 up to 24.7.4.1 of the MindsDB platform, when the Microsoft SharePoint integration is installed on the server. For databases created with the SharePoint engine, an 'INSERT' query can be used for list creation. If such a query is specially crafted to contain Python code and is run against the database, the code will be passed to an eval function and executed on the server (NVD, HiddenLayer).

Technical details

The vulnerability exists inside the createalist function of the mindsdb/integrations/handlers/sharepointhandler/sharepointapi.py file in the Microsoft SharePoint integration. The issue stems from an unprotected eval function that processes the value provided for the list column in an 'INSERT' statement for the lists table. The vulnerability has been assigned a CVSS v3.1 base score of 8.8 (HIGH) with the vector string AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating network accessibility, low attack complexity, and requiring low privileges (HiddenLayer).

Impact

If successfully exploited, this vulnerability allows an authenticated attacker to execute arbitrary Python code on the machine where the MindsDB instance is running. This could lead to complete system compromise, including potential data theft, system manipulation, or further network penetration (HiddenLayer).

Mitigation and workarounds

The vulnerability was addressed in version 24.7.4.1 by replacing the use of 'eval' with 'ast.literal_eval' in the project's Github repository (HiddenLayer).

Community reactions

The vulnerability was discovered and reported by researchers at HiddenLayer, who followed a responsible disclosure process by first notifying the vendor on July 12, 2024. After multiple follow-ups, the vendor acknowledged the issue on September 10, 2024, confirming they had implemented changes to mitigate the reported issues (HiddenLayer).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67511CRITICAL9.6
  • PythonPython
  • cai-framework
NoNoDec 11, 2025
CVE-2025-13780CRITICAL9.1
  • PythonPython
  • pgadmin4
NoYesDec 11, 2025
CVE-2025-67644HIGH7.3
  • PythonPython
  • langgraph-checkpoint-sqlite
NoYesDec 11, 2025
CVE-2025-67720MEDIUM6.5
  • PythonPython
  • pyrofork
NoYesDec 11, 2025
CVE-2025-67485MEDIUM5.3
  • PythonPython
  • mad-proxy
NoNoDec 10, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management