CVE-2026-33057

CRITICAL NUCLEI

Mesop Affected by Unauthenticated Remote Code Execution via Test Suite Route /exec-py

Title source: cna
STIX 2.1

Description

Mesop is a Python-based UI framework that allows users to build web applications. In versions 1.2.2 and below, an explicit web endpoint inside the ai/ testing module infrastructure directly ingests untrusted Python code strings unconditionally without authentication measures, yielding standard Unrestricted Remote Code Execution. Any individual capable of routing HTTP logic to this server block will gain explicit host-machine command rights. The AI codebase package includes a lightweight debugging Flask server inside ai/sandbox/wsgi_app.py. The /exec-py route accepts base_64 encoded raw string payloads inside the code parameter natively evaluated by a basic POST web request. It saves it rapidly to the operating system logic path and injects it recursively using execute_module(module_path...). This issue has been fixed in version 1.2.3.

Nuclei Templates (1)

Mesop AI Sandbox <= 1.2.2 - Remote Code Execution
CRITICALVERIFIEDby sammiee5311,liyander
Shodan: html:"Mesop"

Scores

CVSS v3 9.8
EPSS 0.0036
EPSS Percentile 57.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact total

Details

CWE
CWE-94
Status published
Products (2)
mesop-dev/mesop < 1.2.3 (2 CPE variants)
pypi/mesop 0 - 1.2.3PyPI
Published Mar 20, 2026
Tracked Since Mar 20, 2026