| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-r5pr-887v-m2w9 | Stored XSS in Memray-generated HTML reports via unescaped command-line metadata |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 19 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:bloomberg:memray:*:*:*:*:*:python:*:* |
Thu, 19 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Mar 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bloomberg
Bloomberg memray |
|
| Vendors & Products |
Bloomberg
Bloomberg memray |
Wed, 18 Mar 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Memray is a memory profiler for Python. Prior to Memray 1.19.2, Memray rendered the command line of the tracked process directly into generated HTML reports without escaping. Because there was no escaping, attacker-controlled command line arguments were inserted as raw HTML into the generated report. This allowed JavaScript execution when a victim opened the generated report in a browser. Version 1.19.2 fixes the issue. | |
| Title | Memray-generated HTML reports vulnerable to Stored XSS via unescaped command-line metadata | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-19T17:39:50.970Z
Reserved: 2026-03-13T15:02:00.625Z
Link: CVE-2026-32722
Updated: 2026-03-19T17:39:47.037Z
Status : Analyzed
Published: 2026-03-18T22:16:24.670
Modified: 2026-03-19T19:21:28.677
Link: CVE-2026-32722
No data.
OpenCVE Enrichment
Updated: 2026-03-19T08:55:26Z
Github GHSA