Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33140: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ParzivalHack PySpector

0
Medium
VulnerabilityCVE-2026-33140cvecve-2026-33140cwe-79
Published: Fri Mar 20 2026 (03/20/2026, 20:00:20 UTC)
Source: CVE Database V5
Vendor/Project: ParzivalHack
Product: PySpector

Description

PySpector is a static analysis security testing (SAST) Framework engineered for modern Python development workflows. PySpector versions 0.1.6 and prior are affected by a stored Cross-Site Scripting (XSS) vulnerability in the HTML report generator. When PySpector scans a Python file containing JavaScript payloads (i.e. inside a string passed to eval() ), the flagged code snippet is interpolated into the HTML report without sanitization. Opening the generated report in a browser causes the embedded JavaScript to execute in the browser's local file context. This issue has been patched in version 0.1.7.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 20:25:20 UTC

Technical Analysis

PySpector is a static analysis security testing (SAST) framework designed for Python development workflows. Versions 0.1.6 and earlier are vulnerable to a stored Cross-Site Scripting (XSS) vulnerability identified as CVE-2026-33140. The vulnerability exists in the HTML report generator component of PySpector. When PySpector scans Python files containing JavaScript payloads embedded within strings passed to eval(), it flags these code snippets and interpolates them directly into the generated HTML report without proper sanitization or encoding. This lack of input neutralization allows malicious JavaScript code to be embedded and stored within the report. When a user opens the generated HTML report in a web browser, the embedded JavaScript executes in the context of the local file system, which can lead to unauthorized script execution. This could allow attackers to perform actions such as stealing local data accessible via the browser, manipulating the report content, or potentially exploiting browser vulnerabilities. The vulnerability does not require any authentication to exploit but does require the victim to open the maliciously crafted report file, making user interaction necessary. The issue was addressed and patched in PySpector version 0.1.7 by implementing proper sanitization of the flagged code snippets before embedding them in the HTML report. There are no known exploits in the wild at the time of publication. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required for the attack to succeed, but user interaction is needed to open the report. The scope is limited to the local environment where the report is opened.

Potential Impact

The primary impact of this vulnerability is the execution of arbitrary JavaScript code in the context of the local file system when a user opens a maliciously crafted PySpector report. This can lead to several security risks including unauthorized access to local files accessible via the browser, theft of sensitive information, manipulation or corruption of the report data, and potential pivoting to further attacks if browser vulnerabilities are chained. For organizations, this could result in leakage of sensitive code analysis results or local data, undermining the confidentiality and integrity of development workflows. Since PySpector is used in Python development environments, compromised reports could affect developers, security analysts, and quality assurance teams, potentially impacting software supply chain security. Although the vulnerability requires user interaction (opening the report), the risk is significant in environments where reports are shared or stored in locations accessible to multiple users. The vulnerability does not affect the availability of systems but can erode trust in the security of development tools and processes.

Mitigation Recommendations

Organizations and users should immediately upgrade PySpector to version 0.1.7 or later, where the vulnerability has been patched. Until upgrading, users must avoid opening HTML reports generated by PySpector versions prior to 0.1.7, especially if the reports originate from untrusted or unknown sources. Implement strict controls on the distribution and storage of PySpector reports to prevent malicious report injection. Security teams should educate developers and analysts about the risks of opening untrusted reports and encourage scanning of report files with endpoint protection solutions. Additionally, consider opening reports in sandboxed or isolated environments to limit the impact of potential script execution. Monitoring for unusual browser activity or local file access during report viewing can help detect exploitation attempts. Finally, incorporate secure coding and input sanitization best practices in custom report generation or tooling integrations to prevent similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T20:35:49.929Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bda974e32a4fbe5fca0bb7

Added to database: 3/20/2026, 8:09:24 PM

Last enriched: 3/20/2026, 8:25:20 PM

Last updated: 3/21/2026, 3:53:51 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses