First published: Mon May 05 2025(Updated: )
A vulnerability was found in GAIR-NLP factool up to 3f3914bc090b644be044b7e0005113c135d8b20f. It has been classified as critical. This affects the function run_single of the file factool/factool/math/tool.py. The manipulation leads to code injection. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
GAIR-NLP Factool | <=3f3914bc090b644be044b7e0005113c135d8b20f |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4261 has been classified as critical due to its potential for code injection.
CVE-2025-4261 affects the function run_single in the file factool/factool/math/tool.py of GAIR-NLP factool.
To fix CVE-2025-4261, upgrade GAIR-NLP factool to a version beyond 3f3914bc090b644be044b7e0005113c135d8b20f.
CVE-2025-4261 is a code injection vulnerability that allows an attacker to manipulate the execution of code.
Yes, using an updated version of GAIR-NLP factool that addresses CVE-2025-4261 will generally enhance your system's security against this vulnerability.