PySpector is a static analysis security testing (SAST) Framework engineered for modern Python development workflows. PySpector versions 0.1.6 and prior are affected by a stored Cross-Site Scripting (XSS) vulnerability in the HTML report generator. When PySpector scans a Python file containing JavaScript payloads (i.e. inside a string passed to eval() ), the flagged code snippet is interpolated into the HTML report without sanitization. Opening the generated report in a browser causes the embedded JavaScript to execute in the browser's local file context. This issue has been patched in version 0.1.7.
References
| Link | Resource |
|---|---|
| https://github.com/ParzivalHack/PySpector/security/advisories/GHSA-2gmv-2r3v-jxj2 | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-20 20:16
Updated : 2026-03-24 21:17
NVD link : CVE-2026-33140
Mitre link : CVE-2026-33140
CVE.ORG link : CVE-2026-33140
JSON object : View
Products Affected
parzivalhack
- pyspector
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
