Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27194: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in man-group dtale

0
High
VulnerabilityCVE-2026-27194cvecve-2026-27194cwe-74
Published: Sat Feb 21 2026 (02/21/2026, 04:25:38 UTC)
Source: CVE Database V5
Vendor/Project: man-group
Product: dtale

Description

D-Tale is a visualizer for pandas data structures. Versions prior to 3.20.0 are vulnerable to Remote Code Execution through the /save-column-filter endpoint. Users hosting D-Tale publicly can be vulnerable to remote code execution allowing attackers to run malicious code on the server. This issue has been fixed in version 3.20.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 12:38:06 UTC

Technical Analysis

D-Tale is an open-source tool that provides a web-based interface for visualizing and interacting with pandas data structures. Versions prior to 3.20.0 contain a critical vulnerability identified as CVE-2026-27194, classified under CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component, commonly known as injection). The vulnerability resides in the /save-column-filter endpoint, which fails to properly sanitize or neutralize special characters or input elements before processing. This flaw enables remote attackers to inject malicious payloads that the server executes, resulting in remote code execution (RCE). The vulnerability is exploitable over the network without requiring authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 base score of 8.1 reflects the critical nature of the flaw, with high impact on confidentiality, integrity, and availability. The vulnerability does not require privileges or user interaction, and the scope is limited to systems running vulnerable D-Tale versions exposed to the internet. The issue has been addressed in D-Tale version 3.20.0, which includes proper input validation and sanitization to prevent injection attacks on the affected endpoint.

Potential Impact

Successful exploitation of CVE-2026-27194 allows attackers to execute arbitrary code on servers running vulnerable versions of D-Tale, potentially leading to full system compromise. This can result in unauthorized data access, data manipulation, disruption of services, deployment of malware, or use of the compromised server as a pivot point for further attacks within an organization’s network. Organizations exposing D-Tale instances publicly are at the highest risk, especially those using it for sensitive data analysis or in production environments. The vulnerability undermines confidentiality, integrity, and availability of affected systems. Given the ease of exploitation and lack of required authentication, the threat is significant for any organization relying on D-Tale for data visualization, particularly in sectors such as finance, healthcare, research, and technology where pandas data structures are commonly used.

Mitigation Recommendations

1. Immediately upgrade all D-Tale instances to version 3.20.0 or later, where the vulnerability is patched. 2. If immediate upgrade is not feasible, restrict access to the D-Tale web interface using network-level controls such as VPNs, IP whitelisting, or firewall rules to limit exposure to trusted users only. 3. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the /save-column-filter endpoint. 4. Conduct thorough code reviews and input validation audits on any custom extensions or integrations with D-Tale to ensure no similar injection flaws exist. 5. Monitor logs for unusual activity or requests to the vulnerable endpoint that could indicate exploitation attempts. 6. Educate development and operations teams about secure coding practices, especially regarding input sanitization and output encoding. 7. Regularly scan and audit public-facing applications for known vulnerabilities and apply patches promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-18T19:47:02.154Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6999354dbe58cf853b449470

Added to database: 2/21/2026, 4:32:13 AM

Last enriched: 2/28/2026, 12:38:06 PM

Last updated: 4/8/2026, 10:52:28 AM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses