CVE-2026-24002 PUBLISHED

pyodide sandbox option is insecure

Assigner: GitHub_M
Reserved: 19.01.2026 Published: 22.01.2026 Updated: 22.01.2026

Grist is spreadsheet software using Python as its formula language. Grist offers several methods for running those formulas in a sandbox, for cases where the user may be working with untrusted spreadsheets. One such method runs them in pyodide, but pyodide on node does not have a useful sandbox barrier. If a user of Grist sets GRIST_SANDBOX_FLAVOR to pyodide and opens a malicious document, that document could run arbitrary processes on the server hosting Grist. The problem has been addressed in Grist version 1.7.9 and up, by running pyodide under deno. As a workaround, a user can use the gvisor-based sandbox by setting GRIST_SANDBOX_FLAVOR to gvisor.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
CVSS Score: 9.1

Product Status

Vendor gristlabs
Product grist-core
Versions
  • Version < 1.7.9 is affected

References

Problem Types

  • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE