The POST /guardrails/test_custom_code endpoint runs user-supplied Python inside a hand-rolled sandbox. The sandbox can be escaped using bytecode-level techniques, allowing arbitrary code execution in the proxy process — which runs as root in the default Docker image.
Reaching the endpoint requires a proxy-admin credential in default configurations.
Fixed in 1.83.11. The hand-rolled sandbox has been replaced with RestrictedPython. Upgrade to 1.83.11 or later.
If upgrading is not immediately possible, block POST /guardrails/test_custom_code at your reverse proxy or API gateway.
v1.83.10-stable{
"severity": "HIGH",
"cwe_ids": [
"CWE-420",
"CWE-913"
],
"github_reviewed": true,
"github_reviewed_at": "2026-05-11T16:17:23Z",
"nvd_published_at": null
}