CVE-2025-51482

Remote Code Execution in letta.server.rest_api.routers.v1.tools.run_tool_from_source in letta-ai Letta 0.7.12 allows remote attackers to execute arbitrary Python code and system commands via crafted payloads to the /v1/tools/run endpoint, bypassing intended sandbox restrictions.
References
Link Resource
https://github.com/letta-ai/letta Product
https://github.com/letta-ai/letta/pull/2630 Exploit Issue Tracking Patch Vendor Advisory
https://www.gecko.security/blog/cve-2025-51482 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:letta:letta:0.7.12:*:*:*:*:*:*:*

History

07 Oct 2025, 20:33

Type Values Removed Values Added
References () https://github.com/letta-ai/letta - () https://github.com/letta-ai/letta - Product
References () https://github.com/letta-ai/letta/pull/2630 - () https://github.com/letta-ai/letta/pull/2630 - Exploit, Issue Tracking, Patch, Vendor Advisory
References () https://www.gecko.security/blog/cve-2025-51482 - () https://www.gecko.security/blog/cve-2025-51482 - Exploit, Third Party Advisory
First Time Letta
Letta letta
CPE cpe:2.3:a:letta:letta:0.7.12:*:*:*:*:*:*:*

25 Jul 2025, 15:29

Type Values Removed Values Added
Summary
  • (es) Ejecución remota de código en letta.server.rest_api.routers.v1.tools.run_tool_from_source en letta-ai Letta 0.7.12 permite a atacantes remotos ejecutar código Python arbitrario y comandos del sistema a través de payloads manipuladas en el endpoint /v1/tools/run, eludiendo las restricciones de entorno de pruebas previstas.

22 Jul 2025, 18:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-94

22 Jul 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-22 17:15

Updated : 2025-10-07 20:33


NVD link : CVE-2025-51482

Mitre link : CVE-2025-51482

CVE.ORG link : CVE-2025-51482


JSON object : View

Products Affected

letta

  • letta
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')