Metrics
Affected Vendors & Products
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Premai-io
Premai-io premsql |
|
| Vendors & Products |
Premai-io
Premai-io premsql |
Mon, 06 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 05 Apr 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in premAI-io premsql up to 0.2.1. Affected is the function eval of the file premsql/agents/baseline/workers/followup.py. This manipulation of the argument result causes code injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | premAI-io premsql followup.py eval code injection | |
| Weaknesses | CWE-74 CWE-94 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2026-04-05T18:30:14.413Z
Updated: 2026-04-06T15:25:27.908Z
Reserved: 2026-04-05T05:12:37.784Z
Link: CVE-2026-5594
Updated: 2026-04-06T15:25:23.950Z
Status : Received
Published: 2026-04-05T19:17:05.437
Modified: 2026-04-05T19:17:05.437
Link: CVE-2026-5594
No data.