Skip to content
CVSS 7.8 · HIGH

CVE-2026-41206

PySpector is a static analysis security testing (SAST) Framework engineered for modern Python development workflows. The plugin security validator in PySpector uses AST-based static analysis to prevent dangerous code from being loaded as plugins. Prior to version 0.1.8, the blocklist implemented in `PluginSecurity.validate_plugin_code` is incomplete and can be bypassed using several Python constructs that are not checked. An attacker who can supply a plugin file can achieve arbitrary code execution within the PySpector process when that plugin is installed and executed. Version 0.1.8 fixes the issue.

View on NVD

Analysis

PySpector is a niche static analysis tool for Python, and this vulnerability requires an attacker to successfully plant a malicious plugin file. While it allows arbitrary code execution, the tool's limited adoption compared to standard linters means it does not pose a systemic risk to the general community.

Severity

Score: 7.8(HIGH)
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AV: LOCAL
AC: LOW
PR: NONE
UI: REQUIRED
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-184

EPSS

Probability of exploitation (next 30 days): 0.0002 (0.0%)
Percentile: 5.0%
EPSS: 2026-05-06

Affects

parzivalhack:pyspector

Technical description

PySpector is a static analysis security testing (SAST) Framework engineered for modern Python development workflows. The plugin security validator in PySpector uses AST-based static analysis to prevent dangerous code from being loaded as plugins. Prior to version 0.1.8, the blocklist implemented in `PluginSecurity.validate_plugin_code` is incomplete and can be bypassed using several Python constructs that are not checked. An attacker who can supply a plugin file can achieve arbitrary code execution within the PySpector process when that plugin is installed and executed. Version 0.1.8 fixes the issue.

Published: 4/23/2026, 2:16:18 AM
Last modified: 4/29/2026, 3:48:51 PM

References

HomeEventsBlogResourcesTeam