CVE-2026-33057
Mesop · Mesop
Mesop versions 1.2.2 and below contain an unauthenticated remote code execution (RCE) vulnerability in a debugging endpoint within the AI testing module.
Executive summary
The Mesop UI framework is vulnerable to a critical, unauthenticated remote code execution flaw that allows attackers to gain full host-machine command rights.
Vulnerability
An explicit web endpoint (/exec-py) in the ai/ testing module infrastructure unconditionally ingests and executes base64-encoded Python code strings. This endpoint lacks authentication, allowing any individual who can route HTTP traffic to the server to execute arbitrary commands on the host machine.
Business impact
This is a worst-case scenario vulnerability with a CVSS score of 9.8. An attacker can gain complete control over the server running the Mesop application, leading to total data compromise, installation of malware, or use of the host for lateral movement. The presence of a "debugging" endpoint in production environments poses an extreme risk.
Remediation
Immediate Action: Update Mesop to version 1.2.3 immediately. If an update is not possible, disable or remove the ai/sandbox/wsgi_app.py module from the deployment.
Proactive Monitoring: Scan for the presence of the /exec-py route in your environment and monitor for any POST requests to this endpoint, which are likely malicious.
Compensating Controls: Use network-level filtering to block access to internal testing or debugging routes and ensure that development frameworks are not deployed with testing modules enabled in production.
Exploitation status
Public Exploit Available: No
Analyst recommendation
The severity of this RCE flaw cannot be overstated. IT teams must ensure that no Mesop applications are running version 1.2.2 or below in any accessible environment. Immediate patching to version 1.2.3 is mandatory to prevent total system compromise.