CVE-2026-32722: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bloomberg memray
Memray is a memory profiler for Python. Prior to Memray 1.19.2, Memray rendered the command line of the tracked process directly into generated HTML reports without escaping. Because there was no escaping, attacker-controlled command line arguments were inserted as raw HTML into the generated report. This allowed JavaScript execution when a victim opened the generated report in a browser. Version 1.19.2 fixes the issue.
AI Analysis
Technical Summary
CVE-2026-32722 is a cross-site scripting (CWE-79) vulnerability found in Bloomberg's Memray, a memory profiling tool for Python applications. The vulnerability exists in versions of Memray prior to 1.19.2, where the tool renders the command line arguments of the profiled process directly into the generated HTML report without proper escaping or sanitization. Because the command line arguments can be attacker-controlled, malicious input can be injected as raw HTML and JavaScript into the report. When a user opens this report in a web browser, the embedded script executes in the context of the report, potentially exposing sensitive information or performing unauthorized actions within the user's browser session. The vulnerability has a CVSS 3.1 base score of 3.6, reflecting low severity primarily due to the requirement for local access to generate or receive the malicious report and the need for user interaction to open it. The scope is considered changed (S:C) because the vulnerability affects the confidentiality of information within the report context. The flaw does not impact the integrity or availability of the system running Memray. Bloomberg addressed this issue in Memray version 1.19.2 by implementing proper escaping of command line arguments before rendering them into HTML. No known exploits are reported in the wild as of the publication date. This vulnerability highlights the risks of improper input neutralization in developer tools that generate HTML outputs, which can be leveraged for XSS attacks if untrusted input is included without sanitization.
Potential Impact
The primary impact of this vulnerability is the potential compromise of confidentiality when a user opens a maliciously crafted Memray report in a web browser. An attacker who can control the command line arguments of a profiled process can inject JavaScript into the report, which executes in the victim's browser context. This could lead to theft of sensitive information displayed in the report or exploitation of the user's browser session. However, the vulnerability does not affect system integrity or availability, and exploitation requires local or trusted access to generate or receive the malicious report, as well as user interaction to open it. The risk is therefore limited to environments where untrusted or attacker-controlled command line inputs are profiled and reports are shared without validation. Organizations using Memray in development, testing, or production profiling workflows may face risks if they open reports generated from untrusted sources. The vulnerability could be leveraged in targeted attacks against developers or analysts who routinely open profiling reports, potentially exposing internal data or credentials. Overall, the impact is low but non-negligible in sensitive environments.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Memray to version 1.19.2 or later, where the issue is fixed by proper escaping of command line arguments in HTML reports. Until the upgrade is applied, users should avoid opening Memray-generated HTML reports from untrusted or unknown sources. Implement strict access controls to limit who can run Memray profiling on systems and who can generate or view reports. Incorporate security awareness training to inform developers and analysts about the risks of opening untrusted reports. Consider scanning or sanitizing command line inputs before profiling if possible. Additionally, use browser security features such as Content Security Policy (CSP) to restrict script execution in local HTML files, reducing the impact of potential XSS payloads. Monitor internal usage of Memray reports and audit for any suspicious activity or unexpected report generation. Finally, maintain an inventory of tools and versions used in development environments to ensure timely patching of vulnerabilities.
Affected Countries
United States, United Kingdom, Germany, Japan, India, Canada, Australia, France, Netherlands, South Korea
CVE-2026-32722: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bloomberg memray
Description
Memray is a memory profiler for Python. Prior to Memray 1.19.2, Memray rendered the command line of the tracked process directly into generated HTML reports without escaping. Because there was no escaping, attacker-controlled command line arguments were inserted as raw HTML into the generated report. This allowed JavaScript execution when a victim opened the generated report in a browser. Version 1.19.2 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2026-32722 is a cross-site scripting (CWE-79) vulnerability found in Bloomberg's Memray, a memory profiling tool for Python applications. The vulnerability exists in versions of Memray prior to 1.19.2, where the tool renders the command line arguments of the profiled process directly into the generated HTML report without proper escaping or sanitization. Because the command line arguments can be attacker-controlled, malicious input can be injected as raw HTML and JavaScript into the report. When a user opens this report in a web browser, the embedded script executes in the context of the report, potentially exposing sensitive information or performing unauthorized actions within the user's browser session. The vulnerability has a CVSS 3.1 base score of 3.6, reflecting low severity primarily due to the requirement for local access to generate or receive the malicious report and the need for user interaction to open it. The scope is considered changed (S:C) because the vulnerability affects the confidentiality of information within the report context. The flaw does not impact the integrity or availability of the system running Memray. Bloomberg addressed this issue in Memray version 1.19.2 by implementing proper escaping of command line arguments before rendering them into HTML. No known exploits are reported in the wild as of the publication date. This vulnerability highlights the risks of improper input neutralization in developer tools that generate HTML outputs, which can be leveraged for XSS attacks if untrusted input is included without sanitization.
Potential Impact
The primary impact of this vulnerability is the potential compromise of confidentiality when a user opens a maliciously crafted Memray report in a web browser. An attacker who can control the command line arguments of a profiled process can inject JavaScript into the report, which executes in the victim's browser context. This could lead to theft of sensitive information displayed in the report or exploitation of the user's browser session. However, the vulnerability does not affect system integrity or availability, and exploitation requires local or trusted access to generate or receive the malicious report, as well as user interaction to open it. The risk is therefore limited to environments where untrusted or attacker-controlled command line inputs are profiled and reports are shared without validation. Organizations using Memray in development, testing, or production profiling workflows may face risks if they open reports generated from untrusted sources. The vulnerability could be leveraged in targeted attacks against developers or analysts who routinely open profiling reports, potentially exposing internal data or credentials. Overall, the impact is low but non-negligible in sensitive environments.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Memray to version 1.19.2 or later, where the issue is fixed by proper escaping of command line arguments in HTML reports. Until the upgrade is applied, users should avoid opening Memray-generated HTML reports from untrusted or unknown sources. Implement strict access controls to limit who can run Memray profiling on systems and who can generate or view reports. Incorporate security awareness training to inform developers and analysts about the risks of opening untrusted reports. Consider scanning or sanitizing command line inputs before profiling if possible. Additionally, use browser security features such as Content Security Policy (CSP) to restrict script execution in local HTML files, reducing the impact of potential XSS payloads. Monitor internal usage of Memray reports and audit for any suspicious activity or unexpected report generation. Finally, maintain an inventory of tools and versions used in development environments to ensure timely patching of vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-13T15:02:00.625Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69bb1c7a771bdb1749c7cd16
Added to database: 3/18/2026, 9:43:22 PM
Last enriched: 3/18/2026, 9:58:00 PM
Last updated: 3/19/2026, 4:50:58 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.