Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.3
D-Tale: Public Servers at Risk of Remote Code Attack
GHSA-436g-fhfc-9g5w
CVE-2026-35052
Summary
If you're running D-Tale publicly and use a redis or shelf storage layer, attackers could potentially take control of your server. This is a serious threat, so it's essential to update to the latest version (3.22.0) as soon as possible. If you can't upgrade, you're out of luck, as there are no other fixes available for older versions.
What to do
- Update dtale to version 3.22.0.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | dtale | <= 3.22.0 | 3.22.0 |
Original title
D-Tale: Remote Code Execution through redis/shelf storage
Original description
### Impact
Users hosting D-Tale publicly while using a redis or shelf storage layer could be vulnerable to remote code execution allowing attackers to run malicious code on the server.
### Patches
Users should upgrade to version 3.22.0.
### Workarounds
There are no workarounds for versions < 3.22.0
Users hosting D-Tale publicly while using a redis or shelf storage layer could be vulnerable to remote code execution allowing attackers to run malicious code on the server.
### Patches
Users should upgrade to version 3.22.0.
### Workarounds
There are no workarounds for versions < 3.22.0
ghsa CVSS4.0
5.3
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
Published: 3 Apr 2026 · Updated: 3 Apr 2026 · First seen: 3 Apr 2026