PySpector is a static analysis security testing (SAST) Framework engineered for modern Python development workflows. The plugin security validator in PySpector uses AST-based static analysis to prevent dangerous code from being loaded as plugins. Prior to version 0.1.8, the blocklist implemented in `PluginSecurity.validate_plugin_code` is incomplete and can be bypassed using several Python constructs that are not checked. An attacker who can supply a plugin file can achieve arbitrary code execution within the PySpector process when that plugin is installed and executed. Version 0.1.8 fixes the issue.
References
Configurations
History
29 Apr 2026, 15:48
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Parzivalhack pyspector
Parzivalhack |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CPE | cpe:2.3:a:parzivalhack:pyspector:*:*:*:*:*:python:*:* | |
| References | () https://github.com/ParzivalHack/PySpector/commit/3c9547157fc07396f22b26b3484a9a91eba98555 - Patch | |
| References | () https://github.com/ParzivalHack/PySpector/commit/4e279e078c53d760fd321ff9b698d683c65ccb8e - Patch | |
| References | () https://github.com/ParzivalHack/PySpector/security/advisories/GHSA-vp22-38m5-r39r - Exploit, Vendor Advisory |
23 Apr 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/ParzivalHack/PySpector/security/advisories/GHSA-vp22-38m5-r39r - |
23 Apr 2026, 02:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-23 02:16
Updated : 2026-04-29 15:48
NVD link : CVE-2026-41206
Mitre link : CVE-2026-41206
CVE.ORG link : CVE-2026-41206
JSON object : View
Products Affected
parzivalhack
- pyspector
CWE
CWE-184
Incomplete List of Disallowed Inputs
