CVE-2026-2970

A vulnerability has been found in datapizza-labs datapizza-ai 0.0.2. Affected by this vulnerability is the function RedisCache of the file datapizza-ai-cache/redis/datapizza/cache/redis/cache.py. Such manipulation leads to deserialization. The attack requires being on the local network. A high complexity level is associated with this attack. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:datapizza:datapizza-ai:0.0.2:*:*:*:*:*:*:*

History

25 Feb 2026, 17:34

Type Values Removed Values Added
First Time Datapizza datapizza-ai
Datapizza
CPE cpe:2.3:a:datapizza:datapizza-ai:0.0.2:*:*:*:*:*:*:*
References () https://github.com/hacktivesec/datapizza-ai-disclosure/blob/main/unsafe-deserialization.md - () https://github.com/hacktivesec/datapizza-ai-disclosure/blob/main/unsafe-deserialization.md - Exploit, Third Party Advisory
References () https://github.com/hacktivesec/datapizza-ai-disclosure/blob/main/unsafe-deserialization.md#poc - () https://github.com/hacktivesec/datapizza-ai-disclosure/blob/main/unsafe-deserialization.md#poc - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.347337 - () https://vuldb.com/?ctiid.347337 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.347337 - () https://vuldb.com/?id.347337 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.755363 - () https://vuldb.com/?submit.755363 - Exploit, Third Party Advisory, VDB Entry

23 Feb 2026, 18:13

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad en datapizza-labs datapizza-ai 0.0.2 que afecta a la función RedisCache del archivo datapizza-ai-cache/redis/datapizza/cache/redis/cache.py. Al manipularla se logra realizar una deserialización. El ataque requiere estar en la red local. El ataque es de complejidad alta y difícil de explotar. El exploit ha sido divulgado al público y puede ser usado. El proveedor fue contactado con antelación sobre esta divulgación pero no respondió de ninguna manera.

23 Feb 2026, 05:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-23 05:16

Updated : 2026-02-25 17:34


NVD link : CVE-2026-2970

Mitre link : CVE-2026-2970

CVE.ORG link : CVE-2026-2970


JSON object : View

Products Affected

datapizza

  • datapizza-ai
CWE
CWE-20

Improper Input Validation

CWE-502

Deserialization of Untrusted Data