CVE-2026-33140: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ParzivalHack PySpector
PySpector is a static analysis security testing (SAST) Framework engineered for modern Python development workflows. PySpector versions 0.1.6 and prior are affected by a stored Cross-Site Scripting (XSS) vulnerability in the HTML report generator. When PySpector scans a Python file containing JavaScript payloads (i.e. inside a string passed to eval() ), the flagged code snippet is interpolated into the HTML report without sanitization. Opening the generated report in a browser causes the embedded JavaScript to execute in the browser's local file context. This issue has been patched in version 0.1.7.
AI Analysis
Technical Summary
PySpector is a static analysis security testing (SAST) framework designed for Python development workflows. Versions 0.1.6 and earlier are vulnerable to a stored Cross-Site Scripting (XSS) vulnerability identified as CVE-2026-33140. The vulnerability exists in the HTML report generator component of PySpector. When PySpector scans Python files containing JavaScript payloads embedded within strings passed to eval(), it flags these code snippets and interpolates them directly into the generated HTML report without proper sanitization or encoding. This lack of input neutralization allows malicious JavaScript code to be embedded and stored within the report. When a user opens the generated HTML report in a web browser, the embedded JavaScript executes in the context of the local file system, which can lead to unauthorized script execution. This could allow attackers to perform actions such as stealing local data accessible via the browser, manipulating the report content, or potentially exploiting browser vulnerabilities. The vulnerability does not require any authentication to exploit but does require the victim to open the maliciously crafted report file, making user interaction necessary. The issue was addressed and patched in PySpector version 0.1.7 by implementing proper sanitization of the flagged code snippets before embedding them in the HTML report. There are no known exploits in the wild at the time of publication. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required for the attack to succeed, but user interaction is needed to open the report. The scope is limited to the local environment where the report is opened.
Potential Impact
The primary impact of this vulnerability is the execution of arbitrary JavaScript code in the context of the local file system when a user opens a maliciously crafted PySpector report. This can lead to several security risks including unauthorized access to local files accessible via the browser, theft of sensitive information, manipulation or corruption of the report data, and potential pivoting to further attacks if browser vulnerabilities are chained. For organizations, this could result in leakage of sensitive code analysis results or local data, undermining the confidentiality and integrity of development workflows. Since PySpector is used in Python development environments, compromised reports could affect developers, security analysts, and quality assurance teams, potentially impacting software supply chain security. Although the vulnerability requires user interaction (opening the report), the risk is significant in environments where reports are shared or stored in locations accessible to multiple users. The vulnerability does not affect the availability of systems but can erode trust in the security of development tools and processes.
Mitigation Recommendations
Organizations and users should immediately upgrade PySpector to version 0.1.7 or later, where the vulnerability has been patched. Until upgrading, users must avoid opening HTML reports generated by PySpector versions prior to 0.1.7, especially if the reports originate from untrusted or unknown sources. Implement strict controls on the distribution and storage of PySpector reports to prevent malicious report injection. Security teams should educate developers and analysts about the risks of opening untrusted reports and encourage scanning of report files with endpoint protection solutions. Additionally, consider opening reports in sandboxed or isolated environments to limit the impact of potential script execution. Monitoring for unusual browser activity or local file access during report viewing can help detect exploitation attempts. Finally, incorporate secure coding and input sanitization best practices in custom report generation or tooling integrations to prevent similar issues.
Affected Countries
United States, Germany, United Kingdom, Canada, France, Japan, Australia, Netherlands, India, South Korea
CVE-2026-33140: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ParzivalHack PySpector
Description
PySpector is a static analysis security testing (SAST) Framework engineered for modern Python development workflows. PySpector versions 0.1.6 and prior are affected by a stored Cross-Site Scripting (XSS) vulnerability in the HTML report generator. When PySpector scans a Python file containing JavaScript payloads (i.e. inside a string passed to eval() ), the flagged code snippet is interpolated into the HTML report without sanitization. Opening the generated report in a browser causes the embedded JavaScript to execute in the browser's local file context. This issue has been patched in version 0.1.7.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
PySpector is a static analysis security testing (SAST) framework designed for Python development workflows. Versions 0.1.6 and earlier are vulnerable to a stored Cross-Site Scripting (XSS) vulnerability identified as CVE-2026-33140. The vulnerability exists in the HTML report generator component of PySpector. When PySpector scans Python files containing JavaScript payloads embedded within strings passed to eval(), it flags these code snippets and interpolates them directly into the generated HTML report without proper sanitization or encoding. This lack of input neutralization allows malicious JavaScript code to be embedded and stored within the report. When a user opens the generated HTML report in a web browser, the embedded JavaScript executes in the context of the local file system, which can lead to unauthorized script execution. This could allow attackers to perform actions such as stealing local data accessible via the browser, manipulating the report content, or potentially exploiting browser vulnerabilities. The vulnerability does not require any authentication to exploit but does require the victim to open the maliciously crafted report file, making user interaction necessary. The issue was addressed and patched in PySpector version 0.1.7 by implementing proper sanitization of the flagged code snippets before embedding them in the HTML report. There are no known exploits in the wild at the time of publication. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required for the attack to succeed, but user interaction is needed to open the report. The scope is limited to the local environment where the report is opened.
Potential Impact
The primary impact of this vulnerability is the execution of arbitrary JavaScript code in the context of the local file system when a user opens a maliciously crafted PySpector report. This can lead to several security risks including unauthorized access to local files accessible via the browser, theft of sensitive information, manipulation or corruption of the report data, and potential pivoting to further attacks if browser vulnerabilities are chained. For organizations, this could result in leakage of sensitive code analysis results or local data, undermining the confidentiality and integrity of development workflows. Since PySpector is used in Python development environments, compromised reports could affect developers, security analysts, and quality assurance teams, potentially impacting software supply chain security. Although the vulnerability requires user interaction (opening the report), the risk is significant in environments where reports are shared or stored in locations accessible to multiple users. The vulnerability does not affect the availability of systems but can erode trust in the security of development tools and processes.
Mitigation Recommendations
Organizations and users should immediately upgrade PySpector to version 0.1.7 or later, where the vulnerability has been patched. Until upgrading, users must avoid opening HTML reports generated by PySpector versions prior to 0.1.7, especially if the reports originate from untrusted or unknown sources. Implement strict controls on the distribution and storage of PySpector reports to prevent malicious report injection. Security teams should educate developers and analysts about the risks of opening untrusted reports and encourage scanning of report files with endpoint protection solutions. Additionally, consider opening reports in sandboxed or isolated environments to limit the impact of potential script execution. Monitoring for unusual browser activity or local file access during report viewing can help detect exploitation attempts. Finally, incorporate secure coding and input sanitization best practices in custom report generation or tooling integrations to prevent similar issues.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-17T20:35:49.929Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69bda974e32a4fbe5fca0bb7
Added to database: 3/20/2026, 8:09:24 PM
Last enriched: 3/20/2026, 8:25:20 PM
Last updated: 3/21/2026, 3:53:51 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.