Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33139: CWE-184: Incomplete List of Disallowed Inputs in ParzivalHack PySpector

0
High
VulnerabilityCVE-2026-33139cvecve-2026-33139cwe-184
Published: Fri Mar 20 2026 (03/20/2026, 19:59:33 UTC)
Source: CVE Database V5
Vendor/Project: ParzivalHack
Product: PySpector

Description

PySpector is a static analysis security testing (SAST) Framework engineered for modern Python development workflows. PySpector versions 0.1.6 and prior are affected by a security validation bypass in the plugin system. The validate_plugin_code() function in plugin_system.py, performs static AST analysis to block dangerous API calls before a plugin is trusted and executed. However, the internal resolve_name() helper only handles ast.Name and ast.Attribute node types, returning None for all others. When a plugin uses indirect function calls via getattr() (such as getattr(os, 'system')) the outer call's func node is of type ast.Call, causing resolve_name() to return None, and the security check to be silently skipped. The plugin incorrectly passes the trust workflow, and executes arbitrary system commands on the user's machine when loaded. This issue has been patched in version 0.1.7.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 20:24:00 UTC

Technical Analysis

CVE-2026-33139 is a vulnerability in the PySpector static analysis framework for Python, specifically in versions before 0.1.7. PySpector uses a plugin system where plugins are vetted before execution by the validate_plugin_code() function, which performs static analysis on the plugin's abstract syntax tree (AST) to detect and block dangerous API calls. The vulnerability stems from the resolve_name() helper function within plugin_system.py, which only processes AST nodes of type ast.Name and ast.Attribute. However, when a plugin uses indirect function calls via getattr(), such as getattr(os, 'system'), the AST node representing the function call is of type ast.Call. Because resolve_name() returns None for ast.Call nodes, the security validation silently skips these calls, allowing malicious plugins to bypass the trust verification process. Consequently, a crafted plugin can execute arbitrary system commands on the user's machine once loaded. This flaw represents an incomplete whitelist or blacklist validation (CWE-184) in the input validation logic. The vulnerability does not require prior authentication but does require user interaction to load the malicious plugin. The issue was publicly disclosed on March 20, 2026, with a CVSS 4.0 score of 8.3 (high severity), reflecting its potential for local privilege abuse and high confidentiality, integrity, and availability impact. No known exploits have been reported, and the vendor has released a patch in version 0.1.7 to address the issue.

Potential Impact

The primary impact of CVE-2026-33139 is the potential for arbitrary code execution on systems running vulnerable versions of PySpector. Since PySpector is used in Python development workflows for static analysis, compromised systems could have their confidentiality, integrity, and availability severely affected. Attackers could execute arbitrary system commands, potentially leading to data theft, system compromise, or disruption of development environments. This could also facilitate supply chain attacks if malicious plugins are distributed or shared within development teams. The vulnerability requires user interaction to load a malicious plugin, limiting remote exploitation but posing a significant risk in environments where untrusted plugins are used or shared. Organizations relying on PySpector for security testing may face increased risk of insider threats or targeted attacks aiming to bypass security controls. The absence of known exploits suggests limited active exploitation, but the high severity and ease of exploitation via crafted plugins warrant immediate attention.

Mitigation Recommendations

To mitigate this vulnerability, organizations and developers should upgrade PySpector to version 0.1.7 or later, where the issue has been patched. Until upgrading, avoid loading plugins from untrusted sources or sharing plugins without thorough manual review. Implement additional manual or automated code reviews of plugins to detect indirect function calls that could bypass static analysis. Consider restricting plugin usage to a controlled set of trusted developers and environments. Employ runtime monitoring and endpoint protection to detect anomalous system command executions originating from development tools. Educate developers about the risks of loading unverified plugins and enforce strict policies on plugin usage. Additionally, consider sandboxing development environments to limit the impact of potential arbitrary code execution. Finally, track updates from the vendor and security community for any further advisories or exploit reports related to PySpector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T20:35:49.929Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bda974e32a4fbe5fca0bb4

Added to database: 3/20/2026, 8:09:24 PM

Last enriched: 3/20/2026, 8:24:00 PM

Last updated: 3/21/2026, 2:03:27 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses