{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T10:49:44.980","vulnerabilities":[{"cve":{"id":"CVE-2024-45858","sourceIdentifier":"6f8de1f0-f67e-45a6-b68f-98777fdb759c","published":"2024-09-18T15:15:16.333","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"An arbitrary code execution vulnerability exists in versions 0.2.9 up to 0.5.10 of the Guardrails AI Guardrails framework because of the way it validates XML files. If a victim user loads a maliciously crafted XML file containing Python code, the code will be passed to an eval function, causing it to execute on the user's machine."},{"lang":"es","value":"Existe una vulnerabilidad de ejecución de código arbitrario en las versiones 0.2.9 a 0.5.10 del framework Guardrails AI Guardrails debido a la forma en que valida los archivos XML. Si un usuario víctima carga un archivo XML manipulado con fines malintencionados que contiene código Python, el código se pasará a una función eval, lo que provocará su ejecución en la máquina del usuario."}],"metrics":{"cvssMetricV31":[{"source":"6f8de1f0-f67e-45a6-b68f-98777fdb759c","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"6f8de1f0-f67e-45a6-b68f-98777fdb759c","type":"Secondary","description":[{"lang":"en","value":"CWE-95"}]}],"references":[{"url":"https://hiddenlayer.com/sai-security-advisory/2024-09-guardrails/","source":"6f8de1f0-f67e-45a6-b68f-98777fdb759c"}]}}]}