{"id":"CVE-2024-45846","details":"An arbitrary code execution vulnerability exists in versions 23.10.3.0 up to 24.7.4.1 of the MindsDB platform, when the Weaviate integration is installed on the server. If a specially crafted ‘SELECT WHERE’ clause containing Python code is run against a database created with the Weaviate engine, the code will be passed to an eval function and executed on the server.","aliases":["GHSA-wcjw-3v6p-4v3r","PYSEC-2024-77"],"modified":"2026-04-09T10:23:25.216438Z","published":"2024-09-12T13:15:12.920Z","references":[{"type":"EVIDENCE","url":"https://hiddenlayer.com/sai-security-advisory/2024-09-mindsdb/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mindsdb/mindsdb","events":[{"introduced":"5292f64e971b7e482e8958a69170c230fb3edfca"},{"fixed":"0d7731e030343164d80ec07667ac05657cfb74e5"}],"database_specific":{"versions":[{"introduced":"23.10.3.0"},{"fixed":"24.7.4.1"}]}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-45846.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}