CVE-2026-45227 PUBLISHED

Heym < 0.0.21 Sandbox Escape via Python Introspection

Assigner: VulnCheck
Reserved: 11.05.2026 Published: 12.05.2026 Updated: 12.05.2026

Heym before 0.0.21 contains a sandbox escape vulnerability in the custom Python tool executor that allows authenticated workflow authors to bypass sandbox restrictions by using object-graph introspection primitives. Attackers can use Python introspection techniques to recover the unrestricted import function, import blocked modules such as os and subprocess, and access inherited backend environment variables containing database credentials and encryption keys to execute arbitrary host commands as the backend service user.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor heymrun
Product heym
Versions Default: affected
  • affected from 0 to 0.0.21 (excl.)
  • Version 32b7e809d987d9b018ec8daa2cdaf48f627f26f1 is unaffected

Credits

  • Chia Min Jun Lennon finder

References

Problem Types

  • Protection Mechanism Failure CWE