Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24002: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in gristlabs grist-core

0
Critical
VulnerabilityCVE-2026-24002cvecve-2026-24002cwe-74
Published: Thu Jan 22 2026 (01/22/2026, 02:26:28 UTC)
Source: CVE Database V5
Vendor/Project: gristlabs
Product: grist-core

Description

CVE-2026-24002 is a critical vulnerability in gristlabs' grist-core spreadsheet software, specifically affecting versions prior to 1. 7. 9. The flaw arises from improper sandboxing of Python formulas executed via pyodide on Node. js, allowing malicious spreadsheet documents to execute arbitrary processes on the hosting server. This vulnerability can lead to full compromise of confidentiality, integrity, and availability of affected systems without requiring authentication or user interaction beyond opening a malicious document. The issue is resolved in grist-core version 1. 7. 9 by switching pyodide execution to run under deno, which provides a stronger sandbox. As a temporary mitigation, users can configure the sandbox flavor to use gvisor instead of pyodide.

AI-Powered Analysis

AILast updated: 01/22/2026, 03:05:53 UTC

Technical Analysis

Grist is a spreadsheet software platform that uses Python as its formula language, allowing users to run complex computations within spreadsheets. To protect against malicious code execution, Grist provides sandboxing methods for running these Python formulas. One such method uses pyodide, a WebAssembly-based Python environment running on Node.js. However, pyodide on Node.js lacks effective sandboxing barriers, meaning that if a user opens a malicious spreadsheet document with the environment variable `GRIST_SANDBOX_FLAVOR` set to `pyodide`, the malicious code can escape the sandbox and execute arbitrary processes on the server hosting Grist. This vulnerability is classified under CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component), indicating injection risks that lead to code execution. The vulnerability affects all grist-core versions prior to 1.7.9. The vendor addressed the issue by changing the sandbox environment to run pyodide under deno, a secure runtime with better isolation capabilities. As an interim mitigation, users can switch the sandbox flavor to `gvisor`, a container-based sandboxing solution that provides stronger isolation. The CVSS v3.1 score is 9.1 (critical), reflecting the network attack vector, no privileges or user interaction required, and complete compromise of confidentiality, integrity, and availability. There are no known exploits in the wild yet, but the severity and ease of exploitation make this a high-risk vulnerability for any exposed deployments.

Potential Impact

For European organizations, the impact of CVE-2026-24002 can be severe. Organizations using grist-core in server environments—especially those that allow uploading or sharing of spreadsheets from untrusted sources—are at risk of remote code execution attacks. Successful exploitation can lead to full system compromise, data theft, data manipulation, or service disruption. This is particularly critical for sectors handling sensitive or regulated data such as finance, healthcare, government, and education. The ability to execute arbitrary processes on the server can also facilitate lateral movement within networks, potentially affecting broader IT infrastructure. Given the criticality and the lack of required authentication or user interaction beyond opening a malicious document, the threat surface is broad. Additionally, organizations relying on grist-core for collaborative or cloud-based spreadsheet services may face increased exposure. The absence of known exploits in the wild does not reduce the urgency, as proof-of-concept exploits could emerge rapidly given the public disclosure.

Mitigation Recommendations

European organizations should immediately upgrade all grist-core deployments to version 1.7.9 or later, where the vulnerability is fully patched by running pyodide under the deno runtime. If immediate upgrading is not feasible, administrators should configure the environment variable `GRIST_SANDBOX_FLAVOR` to `gvisor` to switch to a more secure sandboxing mechanism. Network-level protections should be applied to restrict access to Grist servers, limiting exposure to untrusted users and sources. Monitoring and logging should be enhanced to detect unusual process executions or sandbox escapes. Organizations should also review and restrict the types of spreadsheet documents accepted or shared, applying content scanning or sandboxing at the file upload stage. Regular vulnerability scanning and penetration testing focused on grist-core deployments can help identify residual risks. Finally, educating users about the risks of opening untrusted spreadsheets and maintaining strict access controls will reduce the likelihood of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-19T18:49:20.658Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697190914623b1157c0cb7fe

Added to database: 1/22/2026, 2:50:57 AM

Last enriched: 1/22/2026, 3:05:53 AM

Last updated: 1/22/2026, 5:06:03 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats