CVE-2026-6977: Vanna-AI Legacy Flask API Improper Authorization
The National Vulnerability Database has disclosed CVE-2026-6977, a high-severity improper authorization vulnerability affecting vanna-ai vanna up to version 2.0.2. This flaw, with a CVSS score of 7.3, resides within an unspecified function of the Legacy Flask API component, allowing remote attackers to exploit it without authentication. The public disclosure of this exploit means active exploitation is a significant risk.
This vulnerability stems from CWE-266 (Improper Authorization) and CWE-285 (Improper Authorization on Check Privilege), indicating a fundamental flaw in how the application manages access controls. The attacker’s calculus here is straightforward: no authentication required, remote access, and a publicly available exploit. This significantly lowers the barrier to entry for opportunistic attackers looking to gain unauthorized access or control over affected instances.
Defenders need to act fast. The vendor was reportedly unresponsive to early disclosure attempts, which is a red flag. Organizations utilizing vanna-ai vanna should immediately assess their deployments for the presence of the Legacy Flask API and determine if they are running affected versions. Given the remote exploitability and public disclosure, assume compromise is possible if unpatched.
What This Means For You
- If your organization uses vanna-ai vanna, specifically versions up to 2.0.2, immediately identify if the Legacy Flask API component is in use. Prioritize patching or implementing compensating controls to restrict access to this API, as remote, unauthenticated exploitation is possible with a publicly available exploit. Audit logs for any suspicious activity related to this component.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-6977: Vanna-AI Legacy Flask API Unauthorized Access Attempt
title: CVE-2026-6977: Vanna-AI Legacy Flask API Unauthorized Access Attempt
id: scw-2026-04-25-ai-1
status: experimental
level: high
description: |
Detects attempts to access the legacy Flask API endpoint of Vanna-AI (versions up to 2.0.2) via POST requests, which is indicative of exploitation for CVE-2026-6977. This rule targets the specific API path that is vulnerable to improper authorization.
author: SCW Feed Engine (AI-generated)
date: 2026-04-25
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-6977/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/api/v1/legacy'
cs-method|exact:
- 'POST'
sc-status|exact:
- '200'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6977 | Auth Bypass | vanna-ai vanna up to 2.0.2 |
| CVE-2026-6977 | Auth Bypass | Legacy Flask API component |
| CVE-2026-6977 | unknown function in Legacy Flask API |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 25, 2026 at 14:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.