CVE-2026-33140: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ParzivalHack PySpector
PySpector is a static analysis security testing (SAST) Framework engineered for modern Python development workflows. PySpector versions 0.1.6 and prior are affected by a stored Cross-Site Scripting (XSS) vulnerability in the HTML report generator. When PySpector scans a Python file containing JavaScript payloads (i.e. inside a string passed to eval() ), the flagged code snippet is interpolated into the HTML report without sanitization. Opening the generated report in a browser causes the embedded JavaScript to execute in the browser's local file context. This issue has been patched in version 0.1.7.
AI Analysis
Technical Summary
PySpector is a static analysis security testing (SAST) framework designed for Python development workflows. Versions 0.1.6 and earlier contain a stored Cross-Site Scripting (XSS) vulnerability (CWE-79) in the HTML report generator component. When PySpector scans Python source files that include JavaScript payloads embedded within strings passed to eval(), the flagged code snippet is directly interpolated into the generated HTML report without proper sanitization or encoding. This results in malicious JavaScript code being embedded in the report file. When the report is opened in a web browser, the embedded script executes in the context of the local file, which can lead to script execution attacks such as stealing local data, manipulating the report content, or performing other malicious actions within the browser environment. The vulnerability does not require any privileges or authentication to exploit, but it does require the victim to open the crafted report file. The issue was publicly disclosed on March 20, 2026, and patched in PySpector version 0.1.7. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction required, and limited scope impact.
Potential Impact
The primary impact of this vulnerability is the execution of arbitrary JavaScript code in the context of the local file system when a user opens a maliciously crafted PySpector report. This can lead to unauthorized disclosure of sensitive information present on the local machine, manipulation or corruption of the report data, or further exploitation of the user's browser environment. Since PySpector is used in development and security testing workflows, compromised reports could undermine trust in security assessments and potentially expose sensitive source code or analysis results. The vulnerability could be exploited by attackers who can supply or modify Python source files scanned by PySpector or who can trick users into opening malicious reports. Although no known exploits are currently in the wild, the ease of exploitation and the widespread use of PySpector in Python development environments pose a moderate risk to organizations relying on this tool for security testing.
Mitigation Recommendations
To mitigate this vulnerability, organizations and users should immediately upgrade PySpector to version 0.1.7 or later, where the issue has been patched. Until upgrading, users should avoid opening HTML reports generated by PySpector versions prior to 0.1.7, especially reports generated from untrusted or potentially malicious Python source files. Implement strict controls on the source files scanned by PySpector to prevent injection of malicious JavaScript payloads. Additionally, consider opening PySpector reports in isolated or sandboxed browser environments to limit potential damage from script execution. Security teams should review their development and testing workflows to ensure that report files are validated and sanitized before distribution. Incorporating automated scanning of generated reports for embedded scripts could also help detect attempts to exploit this vulnerability.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Japan, India, Netherlands, Sweden
CVE-2026-33140: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ParzivalHack PySpector
Description
PySpector is a static analysis security testing (SAST) Framework engineered for modern Python development workflows. PySpector versions 0.1.6 and prior are affected by a stored Cross-Site Scripting (XSS) vulnerability in the HTML report generator. When PySpector scans a Python file containing JavaScript payloads (i.e. inside a string passed to eval() ), the flagged code snippet is interpolated into the HTML report without sanitization. Opening the generated report in a browser causes the embedded JavaScript to execute in the browser's local file context. This issue has been patched in version 0.1.7.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
PySpector is a static analysis security testing (SAST) framework designed for Python development workflows. Versions 0.1.6 and earlier contain a stored Cross-Site Scripting (XSS) vulnerability (CWE-79) in the HTML report generator component. When PySpector scans Python source files that include JavaScript payloads embedded within strings passed to eval(), the flagged code snippet is directly interpolated into the generated HTML report without proper sanitization or encoding. This results in malicious JavaScript code being embedded in the report file. When the report is opened in a web browser, the embedded script executes in the context of the local file, which can lead to script execution attacks such as stealing local data, manipulating the report content, or performing other malicious actions within the browser environment. The vulnerability does not require any privileges or authentication to exploit, but it does require the victim to open the crafted report file. The issue was publicly disclosed on March 20, 2026, and patched in PySpector version 0.1.7. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction required, and limited scope impact.
Potential Impact
The primary impact of this vulnerability is the execution of arbitrary JavaScript code in the context of the local file system when a user opens a maliciously crafted PySpector report. This can lead to unauthorized disclosure of sensitive information present on the local machine, manipulation or corruption of the report data, or further exploitation of the user's browser environment. Since PySpector is used in development and security testing workflows, compromised reports could undermine trust in security assessments and potentially expose sensitive source code or analysis results. The vulnerability could be exploited by attackers who can supply or modify Python source files scanned by PySpector or who can trick users into opening malicious reports. Although no known exploits are currently in the wild, the ease of exploitation and the widespread use of PySpector in Python development environments pose a moderate risk to organizations relying on this tool for security testing.
Mitigation Recommendations
To mitigate this vulnerability, organizations and users should immediately upgrade PySpector to version 0.1.7 or later, where the issue has been patched. Until upgrading, users should avoid opening HTML reports generated by PySpector versions prior to 0.1.7, especially reports generated from untrusted or potentially malicious Python source files. Implement strict controls on the source files scanned by PySpector to prevent injection of malicious JavaScript payloads. Additionally, consider opening PySpector reports in isolated or sandboxed browser environments to limit potential damage from script execution. Security teams should review their development and testing workflows to ensure that report files are validated and sanitized before distribution. Incorporating automated scanning of generated reports for embedded scripts could also help detect attempts to exploit this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-17T20:35:49.929Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69bda974e32a4fbe5fca0bb7
Added to database: 3/20/2026, 8:09:24 PM
Last enriched: 3/27/2026, 10:43:37 PM
Last updated: 5/5/2026, 6:26:54 AM
Views: 57
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.