{"uuid": "a976ed74-9ca7-4efa-8664-89f69b9a81f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1497", "type": "seen", "source": "https://t.me/cvedetector/19959", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1497 - PlotAI Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1497 \nPublished : March 10, 2025, 2:15 p.m. | 57\u00a0minutes ago \nDescription : A vulnerability, that could result in Remote Code Execution (RCE), has been found in PlotAI. Lack of validation of LLM-generated output allows attacker to execute arbitrary Python code.  \nVendor commented out vulnerable line, further usage of the software requires uncommenting it and thus accepting the risk. The vendor does not plan to release a patch to fix this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T16:31:59.000000Z"}