Description

Mesop is a Python-based UI framework that allows users to build web applications. In versions 1.2.2 and below, an explicit web endpoint inside the ai/ testing module infrastructure directly ingests untrusted Python code strings unconditionally without authentication measures, yielding standard Unrestricted Remote Code Execution. Any individual capable of routing HTTP logic to this server block will gain explicit host-machine command rights. The AI codebase package includes a lightweight debugging Flask server inside ai/sandbox/wsgi_app.py. The /exec-py route accepts base_64 encoded raw string payloads inside the code parameter natively evaluated by a basic POST web request. It saves it rapidly to the operating system logic path and injects it recursively using execute_module(module_path...). This issue has been fixed in version 1.2.3.

INFO

Published Date :

2026-03-20T07:16:59.603Z

Last Modified :

2026-03-25T13:52:27.880Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-33057 vulnerability.

Vendors Products
Mesop-dev
  • Mesop
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-33057.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact