CVE-2026-2970
datapizza-labs datapizza-ai cache.py RedisCache deserialization
CVSS Score
4.6
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability has been found in datapizza-labs datapizza-ai 0.0.2. Affected by this vulnerability is the function RedisCache of the file datapizza-ai-cache/redis/datapizza/cache/redis/cache.py. Such manipulation leads to deserialization. The attack requires being on the local network. A high complexity level is associated with this attack. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
| CWE | CWE-502 CWE-20 |
| Vendor | datapizza-labs |
| Product | datapizza-ai |
| Published | Feb 23, 2026 |
| Last Updated | Feb 23, 2026 |
Stay Ahead of the Next One
Get instant alerts for datapizza-labs datapizza-ai
Be the first to know when new medium vulnerabilities affecting datapizza-labs datapizza-ai are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
datapizza-labs / datapizza-ai
0.0.2
References
vuldb.com: https://vuldb.com/?id.347337 vuldb.com: https://vuldb.com/?ctiid.347337 vuldb.com: https://vuldb.com/?submit.755363 github.com: https://github.com/hacktivesec/datapizza-ai-disclosure/blob/main/unsafe-deserialization.md github.com: https://github.com/hacktivesec/datapizza-ai-disclosure/blob/main/unsafe-deserialization.md#poc
Credits
edoardottt ๐ edoardottt (VulDB User) edoardottt (VulDB User)