TopVuln

High-risk vulnerability digests

CVE-2026-33054

  • CRITICAL

Details

CVSS v3
10.0
NVD published
2026-03-20 07:16:13
Affected versions
Mesop 1.2.2 and below
Summary
This path traversal vulnerability affects the Mesop Python UI framework when deployed with the FileStateSessionBackend. Attackers can supply a malicious untrusted state_token via the UI stream payload to access arbitrary files on the host server. Successful exploitation can result in application denial of service or full arbitrary file manipulation.
Remediation
Upgrade Mesop to version 1.2.3 or newer, which resolves this vulnerability. Restrict network access to Mesop instances to trusted parties only until the update is applied. Verify your deployment is running the patched version after upgrade.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.