Ad

CVE-2026-33057

CRITICAL CVSS 3.1: 9.8 EPSS 0.36%
Updated Mar 24, 2026
Mesop-Dev
Parameter Value
CVSS 9.8 (CRITICAL)
Affected Versions before 1.2.3
Fixed In 1.2.3
Type CWE-94 (Code Injection)
Vendor Mesop-Dev
Public PoC No

Mesop is a Python-based UI framework that allows users to build web applications. In versions 1.2.2 and below, an explicit web endpoint inside the ai/ testing module infrastructure directly ingests untrusted Python code strings unconditionally without authentication measures, yielding standard Unrestricted Remote Code Execution. Any individual capable of routing HTTP logic to this server block will gain explicit host-machine command rights.

The AI codebase package includes a lightweight debugging Flask server inside ai/sandbox/wsgi_app.py. The /exec-py route accepts base_64 encoded raw string payloads inside the code parameter natively evaluated by a basic POST web request. It saves it rapidly to the operating system logic path and injects it recursively using execute_module(module_path...).

This issue has been fixed in version 1.2.3.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Weakness Type (CWE)

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Mesop-Dev Mesop
cpe:2.3:a:mesop-dev:mesop:*:*:*:*:*:*:*:*
1.2.3

Related Vulnerabilities