CVE-2026-33057

Source
https://cve.org/CVERecord?id=CVE-2026-33057
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-33057.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-33057
Aliases
Published
2026-03-20T07:16:59.603Z
Modified
2026-04-02T13:26:48.621894Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Mesop Affected by Unauthenticated Remote Code Execution via Test Suite Route /exec-py
Details

Mesop is a Python-based UI framework that allows users to build web applications. In versions 1.2.2 and below, an explicit web endpoint inside the ai/ testing module infrastructure directly ingests untrusted Python code strings unconditionally without authentication measures, yielding standard Unrestricted Remote Code Execution. Any individual capable of routing HTTP logic to this server block will gain explicit host-machine command rights. The AI codebase package includes a lightweight debugging Flask server inside ai/sandbox/wsgiapp.py. The /exec-py route accepts base64 encoded raw string payloads inside the code parameter natively evaluated by a basic POST web request. It saves it rapidly to the operating system logic path and injects it recursively using executemodule(modulepath...). This issue has been fixed in version 1.2.3.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33057.json",
    "cwe_ids": [
        "CWE-94"
    ]
}
References

Affected packages

Git / github.com/mesop-dev/mesop

Affected ranges

Type
GIT
Repo
https://github.com/mesop-dev/mesop
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*
v0.1
v0.10.0
v0.11.0
v0.11.1
v0.12.0
v0.12.1
v0.12.2
v0.12.3
v0.12.4
v0.12.5
v0.12.6
v0.12.7
v0.12.8
v0.12.9
v0.13.0
v0.14.0
v0.14.1
v0.14.2rc1
v0.14.2rc1-try2
v0.14.2rc1-try3
v0.2
v0.4.1
v0.4.2
v0.5
v0.5.3
v0.5.5
v0.5.6
v0.6.0
v0.7.1
v0.7.2
v0.8.0
v0.9.0
v0.9.1
v0.9.2
v0.9.3
v0.9.4
v0.9.5
v1.*
v1.0.0
v1.0.0rc1
v1.0.0rc2
v1.0.1
v1.0.1rc1
v1.1.0
v1.1.0rc1
v1.1.1
v1.1.1rc1
v1.1.1rc2
v1.1.1rc3
v1.2.0
v1.2.0rc1
v1.2.1
v1.2.1rc1
v1.2.2
v1.2.2rc1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-33057.json"