PySpector is a static analysis security testing (SAST) Framework engineered for modern Python development workflows. PySpector versions 0.1.6 and prior are affected by a stored Cross-Site Scripting (XSS) vulnerability in the HTML report generator. When PySpector scans a Python file containing JavaScript payloads (i.e. inside a string passed to eval() ), the flagged code snippet is interpolated into the HTML report without sanitization. Opening the generated report in a browser causes the embedded JavaScript to execute in the browser's local file context. This issue has been patched in version 0.1.7.
References
| Link | Resource |
|---|---|
| https://github.com/ParzivalHack/PySpector/security/advisories/GHSA-2gmv-2r3v-jxj2 | Exploit Vendor Advisory |
Configurations
History
24 Mar 2026, 21:17
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:parzivalhack:pyspector:*:*:*:*:*:python:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
| References | () https://github.com/ParzivalHack/PySpector/security/advisories/GHSA-2gmv-2r3v-jxj2 - Exploit, Vendor Advisory | |
| First Time |
Parzivalhack pyspector
Parzivalhack |
20 Mar 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-20 20:16
Updated : 2026-03-24 21:17
NVD link : CVE-2026-33140
Mitre link : CVE-2026-33140
CVE.ORG link : CVE-2026-33140
JSON object : View
Products Affected
parzivalhack
- pyspector
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
