CVE-2025-51482

Remote Code Execution in letta.server.rest_api.routers.v1.tools.run_tool_from_source in letta-ai Letta 0.7.12 allows remote attackers to execute arbitrary Python code and system commands via crafted payloads to the /v1/tools/run endpoint, bypassing intended sandbox restrictions.
Configurations

No configuration.

History

25 Jul 2025, 15:29

Type Values Removed Values Added
Summary
  • (es) Ejecución remota de código en letta.server.rest_api.routers.v1.tools.run_tool_from_source en letta-ai Letta 0.7.12 permite a atacantes remotos ejecutar código Python arbitrario y comandos del sistema a través de payloads manipuladas en el endpoint /v1/tools/run, eludiendo las restricciones de entorno de pruebas previstas.

22 Jul 2025, 18:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-94

22 Jul 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-22 17:15

Updated : 2025-07-25 15:29


NVD link : CVE-2025-51482

Mitre link : CVE-2025-51482

CVE.ORG link : CVE-2025-51482


JSON object : View

Products Affected

No product.

CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')