Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. pyspector
  4. ›
  5. CVE-2026-33139

CVE-2026-33139: PySpector has a Plugin Sandbox Bypass leads to Arbitrary Code Execution

March 18, 2026 (updated March 20, 2026)

PySpector versions <= 0.1.6 are affected by a security validation bypass in the plugin system. The validate_plugin_code() function in plugin_system.py, performs static AST analysis to block dangerous API calls before a plugin is trusted and executed. However, the internal resolve_name() helper only handles ast.Name and ast.Attribute node types, returning None for all others. When a plugin uses indirect function calls via getattr() (such as getattr(os, 'system')) the outer call’s func node is of type ast.Call, causing resolve_name() to return None, and the security check to be silently skipped. The plugin incorrectly passes the trust workflow, and executes arbitrary system commands on the user’s machine when loaded.

References

  • github.com/ParzivalHack/PySpector
  • github.com/ParzivalHack/PySpector/security/advisories/GHSA-v3xv-8vc3-h2m6
  • github.com/advisories/GHSA-v3xv-8vc3-h2m6
  • nvd.nist.gov/vuln/detail/CVE-2026-33139

Code Behaviors & Features

Detect and mitigate CVE-2026-33139 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.1.7

Fixed versions

  • 0.1.7

Solution

Upgrade to version 0.1.7 or above.

Impact 7.3 HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L

Learn more about CVSS

Weakness

  • CWE-184: Incomplete List of Disallowed Inputs

Source file

pypi/pyspector/CVE-2026-33139.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:16:43 +0000.