CVE-2026-2970 PUBLISHED

datapizza-labs datapizza-ai cache.py RedisCache deserialization

Assigner: VulDB
Reserved: 22.02.2026 Published: 23.02.2026 Updated: 23.02.2026

A vulnerability has been found in datapizza-labs datapizza-ai 0.0.2. Affected by this vulnerability is the function RedisCache of the file datapizza-ai-cache/redis/datapizza/cache/redis/cache.py. Such manipulation leads to deserialization. The attack requires being on the local network. A high complexity level is associated with this attack. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Metrics

CVSS Vector: CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
CVSS Score: 2.1

Product Status

Vendor datapizza-labs
Product datapizza-ai
Versions
  • Version 0.0.2 is affected

Credits

  • edoardottt finder
  • edoardottt (VulDB User) reporter
  • edoardottt (VulDB User) analyst

References

Problem Types

  • Deserialization CWE
  • Improper Input Validation CWE