CVE-2026-32640

SimpleEval is a library for adding evaluatable expressions into python projects. Prior to 1.0.5, objects (including modules) can leak dangerous modules through to direct access inside the sandbox. If the objects you've passed in as names to SimpleEval have modules or other disallowed / dangerous objects available as attrs. Additionally, dangerous functions or modules could be accessed by passing them as callbacks to other safe functions to call. The latest version 1.0.5 has this issue fixed. This vulnerability is fixed in 1.0.5.
Configurations

Configuration 1 (hide)

cpe:2.3:a:danthedeckie:simpleeval:*:*:*:*:*:python:*:*

History

18 Mar 2026, 18:26

Type Values Removed Values Added
CPE cpe:2.3:a:danthedeckie:simpleeval:*:*:*:*:*:python:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://github.com/danthedeckie/simpleeval/security/advisories/GHSA-44vg-5wv2-h2hg - () https://github.com/danthedeckie/simpleeval/security/advisories/GHSA-44vg-5wv2-h2hg - Mitigation, Vendor Advisory
First Time Danthedeckie simpleeval
Danthedeckie

16 Mar 2026, 14:19

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-16 14:19

Updated : 2026-03-18 18:26


NVD link : CVE-2026-32640

Mitre link : CVE-2026-32640

CVE.ORG link : CVE-2026-32640


JSON object : View

Products Affected

danthedeckie

  • simpleeval
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-915

Improperly Controlled Modification of Dynamically-Determined Object Attributes