CVE-2026-32722 PUBLISHED

Memray-generated HTML reports vulnerable to Stored XSS via unescaped command-line metadata

Assigner: GitHub_M
Reserved: 13.03.2026 Published: 18.03.2026 Updated: 18.03.2026

Memray is a memory profiler for Python. Prior to Memray 1.19.2, Memray rendered the command line of the tracked process directly into generated HTML reports without escaping. Because there was no escaping, attacker-controlled command line arguments were inserted as raw HTML into the generated report. This allowed JavaScript execution when a victim opened the generated report in a browser. Version 1.19.2 fixes the issue.

Metrics

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
CVSS Score: 3.6

Product Status

Vendor bloomberg
Product memray
Versions
  • Version < 1.19.2 is affected

References

Problem Types

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE