CVE-2026-41206

🟡 Monitoruj

Luka w PySpector pozwala na zdalne wykonanie kodu przez niebezpieczne wtyczki.

CVSS
7.8
EPSS
0.0%
Exploit
poc
Vendor
parzivalhack
Opis źródłowy (NVD)

PySpector is a static analysis security testing (SAST) Framework engineered for modern Python development workflows. The plugin security validator in PySpector uses AST-based static analysis to prevent dangerous code from being loaded as plugins. Prior to version 0.1.8, the blocklist implemented in `PluginSecurity.validate_plugin_code` is incomplete and can be bypassed using several Python constructs that are not checked. An attacker who can supply a plugin file can achieve arbitrary code execution within the PySpector process when that plugin is installed and executed. Version 0.1.8 fixes the issue.

exploit rce Brak patcha
Źródła i daty
ŹródłoWartość
NVD – CVSS7.8
CISA KEV (aktywnie wykorzystywane)Nie
FIRST EPSS (prawdopodobieństwo exploita)0.0%
Opublikowano (NVD)2026-04-23 02:16:18 UTC
Ostatnia modyfikacja (NVD)2026-04-29 15:48:51 UTC
Referencje