Mesop is a Python-based UI framework that allows users to build web applications. In versions 1.2.2 and below, an explicit web endpoint inside the ai/ testing module infrastructure directly ingests untrusted Python code strings unconditionally without authentication measures, yielding standard Unrestricted Remote Code Execution. Any individual capable of routing HTTP logic to this server block will gain explicit host-machine command rights. The AI codebase package includes a lightweight debugging Flask server inside ai/sandbox/wsgi_app.py. The /exec-py route accepts base_64 encoded raw string payloads inside the code parameter natively evaluated by a basic POST web request. It saves it rapidly to the operating system logic path and injects it recursively using execute_module(module_path...). This issue has been fixed in version 1.2.3.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-gjgx-rvqr-6w6v | Mesop Affected by Unauthenticated Remote Code Execution via Test Suite Route /exec-py |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 20 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mesop-dev
Mesop-dev mesop |
|
| Vendors & Products |
Mesop-dev
Mesop-dev mesop |
Fri, 20 Mar 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Mesop is a Python-based UI framework that allows users to build web applications. In versions 1.2.2 and below, an explicit web endpoint inside the ai/ testing module infrastructure directly ingests untrusted Python code strings unconditionally without authentication measures, yielding standard Unrestricted Remote Code Execution. Any individual capable of routing HTTP logic to this server block will gain explicit host-machine command rights. The AI codebase package includes a lightweight debugging Flask server inside ai/sandbox/wsgi_app.py. The /exec-py route accepts base_64 encoded raw string payloads inside the code parameter natively evaluated by a basic POST web request. It saves it rapidly to the operating system logic path and injects it recursively using execute_module(module_path...). This issue has been fixed in version 1.2.3. | |
| Title | Mesop Affected by Unauthenticated Remote Code Execution via Test Suite Route /exec-py | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T07:16:59.603Z
Reserved: 2026-03-17T18:10:50.213Z
Link: CVE-2026-33057
No data.
Status : Received
Published: 2026-03-20T08:16:11.763
Modified: 2026-03-20T08:16:11.763
Link: CVE-2026-33057
No data.
OpenCVE Enrichment
Updated: 2026-03-20T08:52:14Z
Weaknesses
Github GHSA