Remote Code Execution in letta.server.rest_api.routers.v1.tools.run_tool_from_source in letta-ai Letta 0.7.12 allows remote attackers to execute arbitrary Python code and system commands via crafted payloads to the /v1/tools/run endpoint, bypassing intended sandbox restrictions.
References
Link | Resource |
---|---|
https://github.com/letta-ai/letta | Product |
https://github.com/letta-ai/letta/pull/2630 | Exploit Issue Tracking Patch Vendor Advisory |
https://www.gecko.security/blog/cve-2025-51482 | Exploit Third Party Advisory |
Configurations
History
07 Oct 2025, 20:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/letta-ai/letta - Product | |
References | () https://github.com/letta-ai/letta/pull/2630 - Exploit, Issue Tracking, Patch, Vendor Advisory | |
References | () https://www.gecko.security/blog/cve-2025-51482 - Exploit, Third Party Advisory | |
First Time |
Letta
Letta letta |
|
CPE | cpe:2.3:a:letta:letta:0.7.12:*:*:*:*:*:*:* |
25 Jul 2025, 15:29
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
22 Jul 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CWE | CWE-94 |
22 Jul 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-22 17:15
Updated : 2025-10-07 20:33
NVD link : CVE-2025-51482
Mitre link : CVE-2025-51482
CVE.ORG link : CVE-2025-51482
JSON object : View
Products Affected
letta
- letta
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')