Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33140: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ParzivalHack PySpector

0
Medium
VulnerabilityCVE-2026-33140cvecve-2026-33140cwe-79
Published: Fri Mar 20 2026 (03/20/2026, 20:00:20 UTC)
Source: CVE Database V5
Vendor/Project: ParzivalHack
Product: PySpector

Description

PySpector is a static analysis security testing (SAST) Framework engineered for modern Python development workflows. PySpector versions 0.1.6 and prior are affected by a stored Cross-Site Scripting (XSS) vulnerability in the HTML report generator. When PySpector scans a Python file containing JavaScript payloads (i.e. inside a string passed to eval() ), the flagged code snippet is interpolated into the HTML report without sanitization. Opening the generated report in a browser causes the embedded JavaScript to execute in the browser's local file context. This issue has been patched in version 0.1.7.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 22:43:37 UTC

Technical Analysis

PySpector is a static analysis security testing (SAST) framework designed for Python development workflows. Versions 0.1.6 and earlier contain a stored Cross-Site Scripting (XSS) vulnerability (CWE-79) in the HTML report generator component. When PySpector scans Python source files that include JavaScript payloads embedded within strings passed to eval(), the flagged code snippet is directly interpolated into the generated HTML report without proper sanitization or encoding. This results in malicious JavaScript code being embedded in the report file. When the report is opened in a web browser, the embedded script executes in the context of the local file, which can lead to script execution attacks such as stealing local data, manipulating the report content, or performing other malicious actions within the browser environment. The vulnerability does not require any privileges or authentication to exploit, but it does require the victim to open the crafted report file. The issue was publicly disclosed on March 20, 2026, and patched in PySpector version 0.1.7. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction required, and limited scope impact.

Potential Impact

The primary impact of this vulnerability is the execution of arbitrary JavaScript code in the context of the local file system when a user opens a maliciously crafted PySpector report. This can lead to unauthorized disclosure of sensitive information present on the local machine, manipulation or corruption of the report data, or further exploitation of the user's browser environment. Since PySpector is used in development and security testing workflows, compromised reports could undermine trust in security assessments and potentially expose sensitive source code or analysis results. The vulnerability could be exploited by attackers who can supply or modify Python source files scanned by PySpector or who can trick users into opening malicious reports. Although no known exploits are currently in the wild, the ease of exploitation and the widespread use of PySpector in Python development environments pose a moderate risk to organizations relying on this tool for security testing.

Mitigation Recommendations

To mitigate this vulnerability, organizations and users should immediately upgrade PySpector to version 0.1.7 or later, where the issue has been patched. Until upgrading, users should avoid opening HTML reports generated by PySpector versions prior to 0.1.7, especially reports generated from untrusted or potentially malicious Python source files. Implement strict controls on the source files scanned by PySpector to prevent injection of malicious JavaScript payloads. Additionally, consider opening PySpector reports in isolated or sandboxed browser environments to limit potential damage from script execution. Security teams should review their development and testing workflows to ensure that report files are validated and sanitized before distribution. Incorporating automated scanning of generated reports for embedded scripts could also help detect attempts to exploit this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T20:35:49.929Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bda974e32a4fbe5fca0bb7

Added to database: 3/20/2026, 8:09:24 PM

Last enriched: 3/27/2026, 10:43:37 PM

Last updated: 5/5/2026, 6:26:54 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses