We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability classified as critical has been found in letta-ai letta up to 0.4.1. Affected is the function function_message of the file letta/letta/interface.py. The manipulation of the argument function_name/function_args leads to improper neutralization of directives in dynamically evaluated code. The exploit has been disclosed to the public and may be used.
Es wurde eine kritische Schwachstelle in letta-ai letta bis 0.4.1 entdeckt. Es betrifft die Funktion function_message der Datei letta/letta/interface.py. Mittels dem Manipulieren des Arguments function_name/function_args mit unbekannten Daten kann eine improper neutralization of directives in dynamically evaluated code-Schwachstelle ausgenutzt werden. Der Exploit steht zur öffentlichen Verfügung.
Improper Neutralization of Directives in Dynamically Evaluated Code
2025-06-15: | Advisory disclosed |
2025-06-15: | VulDB entry created |
2025-06-15: | VulDB entry last update |
ybdesire (VulDB User)
vuldb.com/?id.312570 (VDB-312570 | letta-ai letta interface.py function_message eval injection)
vuldb.com/?ctiid.312570 (VDB-312570 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.590528 (Submit #590528 | letta-ai letta >=v0.4.1 Code Injection)
github.com/letta-ai/letta/issues/2613
Support options