Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.7
SimpleEval: Malicious modules can be accessed in sandbox
GHSA-44vg-5wv2-h2hg
CVE-2026-32640
Summary
A security risk exists in older versions of SimpleEval, which could allow malicious code to access sensitive modules. This could happen if you pass in objects or modules that contain direct access to dangerous items like os or sys. To fix this, update to the latest version 1.0.5 or use a wrapper to protect sensitive items.
What to do
- Update simpleeval to version 1.0.5.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | simpleeval | <= 1.0.5 | 1.0.5 |
Original title
SimpleEval: Objects (including modules) can leak dangerous modules through to direct access inside the sandbox
Original description
### Impact
If the objects passed in as `names` to SimpleEval have modules or other disallowed / dangerous objects available as attrs.
Additionally, dangerous functions or modules could be accessed by passing them as callbacks to other safe functions to call.
Examples (found by @ByamB4):
Any module where non-underscore attribute chains reach os or sys:
- os.path, pathlib, shutil, glob (direct .os / .sys attributes)
- statistics (has .sys)
- numpy (has .ctypeslib.os and .f2py.sys)
- urllib.parse (has .warnings.sys)
### Patches
The latest version 1.0.5 has this issue fixed.
### Workarounds
Don't pass in objects or modules which have direct attributes to potentially dangerous items.
Use a wrapper to wrap the potentially vulnerable items (See the ModuleWrapper in version 1.0.5)
If the objects passed in as `names` to SimpleEval have modules or other disallowed / dangerous objects available as attrs.
Additionally, dangerous functions or modules could be accessed by passing them as callbacks to other safe functions to call.
Examples (found by @ByamB4):
Any module where non-underscore attribute chains reach os or sys:
- os.path, pathlib, shutil, glob (direct .os / .sys attributes)
- statistics (has .sys)
- numpy (has .ctypeslib.os and .f2py.sys)
- urllib.parse (has .warnings.sys)
### Patches
The latest version 1.0.5 has this issue fixed.
### Workarounds
Don't pass in objects or modules which have direct attributes to potentially dangerous items.
Use a wrapper to wrap the potentially vulnerable items (See the ModuleWrapper in version 1.0.5)
ghsa CVSS4.0
8.7
Vulnerability type
CWE-94
Code Injection
CWE-915
Published: 13 Mar 2026 · Updated: 14 Mar 2026 · First seen: 13 Mar 2026