TopVuln

High-risk vulnerability digests

CVE-2026-33057

  • CRITICAL

Details

CVSS v3
9.8
NVD published
2026-03-20 08:16:11
Affected versions
Mesop 1.2.2 and below
Summary
This critical vulnerability allows unauthenticated attackers to execute arbitrary code on the host server running affected Mesop versions. The unprotected /exec-py debug endpoint accepts base64-encoded user input, which is directly evaluated as Python code without any authentication or sandboxing. Successful exploitation gives attackers full control over the affected host.
Remediation
Immediately upgrade Mesop to version 1.2.3 or newer, which removes the vulnerable unauthenticated debug endpoint. Block all external access to instances running affected versions until the patch is applied. Audit affected systems for signs of unauthorized access after patching.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.