
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical vulnerability (CVE-2025-1497) has been discovered in PlotAI software, affecting all versions through 0.0.6. The vulnerability was discovered and reported to CERT Polska, who coordinated its disclosure on March 10, 2025. PlotAI, developed by MLJAR, is a Python library that uses Large Language Models (LLMs) to generate plotting code (CERT Advisory).
The vulnerability is classified as Command Injection (CWE-77) with a CVSS 4.0 Base Score of 9.3 CRITICAL (Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N). The core issue lies in the lack of validation of LLM-generated output, which allows for arbitrary Python code execution through the exec() function in the software's code execution component (NVD, CERT Advisory).
The vulnerability enables Remote Code Execution (RCE), allowing attackers to execute arbitrary Python code on affected systems. This poses a significant security risk as it could lead to complete system compromise, data theft, or service disruption (NVD).
The vendor has implemented a temporary mitigation by commenting out the vulnerable exec() function in the file plotai/code/executor.py. Users who wish to continue using the software must explicitly uncomment this line, acknowledging and accepting the security risks involved. The vendor has stated they do not plan to release a patch to fix this vulnerability (GitHub Repo, CERT Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."