CVE-2026-33140

PySpector is a static analysis security testing (SAST) Framework engineered for modern Python development workflows. PySpector versions 0.1.6 and prior are affected by a stored Cross-Site Scripting (XSS) vulnerability in the HTML report generator. When PySpector scans a Python file containing JavaScript payloads (i.e. inside a string passed to eval() ), the flagged code snippet is interpolated into the HTML report without sanitization. Opening the generated report in a browser causes the embedded JavaScript to execute in the browser's local file context. This issue has been patched in version 0.1.7.
Configurations

Configuration 1 (hide)

cpe:2.3:a:parzivalhack:pyspector:*:*:*:*:*:python:*:*

History

24 Mar 2026, 21:17

Type Values Removed Values Added
CPE cpe:2.3:a:parzivalhack:pyspector:*:*:*:*:*:python:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
References () https://github.com/ParzivalHack/PySpector/security/advisories/GHSA-2gmv-2r3v-jxj2 - () https://github.com/ParzivalHack/PySpector/security/advisories/GHSA-2gmv-2r3v-jxj2 - Exploit, Vendor Advisory
First Time Parzivalhack pyspector
Parzivalhack

20 Mar 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-20 20:16

Updated : 2026-03-24 21:17


NVD link : CVE-2026-33140

Mitre link : CVE-2026-33140

CVE.ORG link : CVE-2026-33140


JSON object : View

Products Affected

parzivalhack

  • pyspector
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')