CVE-2026-32722

LOW

Memray-generated HTML reports vulnerable to Stored XSS via unescaped command-line metadata

Title source: cna

Description

Memray is a memory profiler for Python. Prior to Memray 1.19.2, Memray rendered the command line of the tracked process directly into generated HTML reports without escaping. Because there was no escaping, attacker-controlled command line arguments were inserted as raw HTML into the generated report. This allowed JavaScript execution when a victim opened the generated report in a browser. Version 1.19.2 fixes the issue.

Exploits (1)

nomisec WRITEUP 1 stars
by 0xmrma · poc
https://github.com/0xmrma/CVE-2026-32722

Scores

CVSS v3 3.6
EPSS 0.0001
EPSS Percentile 2.5%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N

Details

CWE
CWE-79
Status published
Products (2)
bloomberg/memray < 1.19.2 (2 CPE variants)
pypi/memray 0 - 1.19.2PyPI
Published Mar 18, 2026
Tracked Since Mar 19, 2026