A flaw has been found in datapizza-labs datapizza-ai 0.0.2. Affected is the function ChatPromptTemplate of the file datapizza-ai-core/datapizza/modules/prompt/prompt.py of the component Jinja2 Template Handler. This manipulation of the argument Prompt causes improper neutralization of special elements used in a template engine. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/hacktivesec/datapizza-ai-disclosure/blob/main/ssti.md | Exploit Third Party Advisory |
| https://github.com/hacktivesec/datapizza-ai-disclosure/blob/main/ssti.md#poc | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.347336 | Exploit Permissions Required |
| https://vuldb.com/?id.347336 | Third Party Advisory |
| https://vuldb.com/?submit.755357 | Exploit |
Configurations
History
No history.
Information
Published : 2026-02-23 05:16
Updated : 2026-02-24 17:58
NVD link : CVE-2026-2969
Mitre link : CVE-2026-2969
CVE.ORG link : CVE-2026-2969
JSON object : View
Products Affected
datapizza
- datapizza_ai
