Grist is spreadsheet software using Python as its formula language. Grist offers several methods for running those formulas in a sandbox, for cases where the user may be working with untrusted spreadsheets. One such method runs them in pyodide, but pyodide on node does not have a useful sandbox barrier. If a user of Grist sets `GRIST_SANDBOX_FLAVOR` to `pyodide` and opens a malicious document, that document could run arbitrary processes on the server hosting Grist. The problem has been addressed in Grist version 1.7.9 and up, by running pyodide under deno. As a workaround, a user can use the gvisor-based sandbox by setting `GRIST_SANDBOX_FLAVOR` to `gvisor`.
References
| Link | Resource |
|---|---|
| https://github.com/gristlabs/grist-core/security/advisories/GHSA-7xvx-8pf2-pv5g | Vendor Advisory |
| https://support.getgrist.com/self-managed/#how-do-i-sandbox-documents | Patch |
Configurations
History
17 Feb 2026, 17:59
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Getgrist
Getgrist grist-core |
|
| References | () https://github.com/gristlabs/grist-core/security/advisories/GHSA-7xvx-8pf2-pv5g - Vendor Advisory | |
| References | () https://support.getgrist.com/self-managed/#how-do-i-sandbox-documents - Patch | |
| CPE | cpe:2.3:a:getgrist:grist-core:*:*:*:*:*:*:*:* |
22 Jan 2026, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-22 03:15
Updated : 2026-02-17 17:59
NVD link : CVE-2026-24002
Mitre link : CVE-2026-24002
CVE.ORG link : CVE-2026-24002
JSON object : View
Products Affected
getgrist
- grist-core
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
