Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.9

PySpector Plugin Code Execution Bypass via Incomplete Validation

GHSA-vp22-38m5-r39r
Summary

An attacker can inject malicious code into PySpector plugins, allowing them to execute arbitrary code within the PySpector process. This happens because the plugin security validator has a list of forbidden functions and attributes that is not comprehensive. To stay secure, ensure you are using the latest version of PySpector and take steps to validate plugins manually or use a more robust validation method.

What to do
  • Update parzivalhack pyspector to version 0.1.8.
Affected software
Ecosystem VendorProductAffected versions
PyPI parzivalhack pyspector < 0.1.8
Fix: upgrade to 0.1.8
Original title
PySpector has a Plugin Code Execution Bypass via Incomplete Static Analysis in PluginSecurity.validate_plugin_code
Original description
### Summary

The plugin security validator in PySpector uses AST-based static analysis to prevent dangerous code from being loaded as plugins. The blocklist implemented in `PluginSecurity.validate_plugin_code` is incomplete and can be bypassed using several Python constructs that are not checked. An attacker who can supply a plugin file can achieve arbitrary code execution within the PySpector process when that plugin is installed and executed.

### Details

The validator maintains a set called `fatal_calls` that enumerates explicitly forbidden function names and attribute access patterns such as eval, exec, `os.system`, and `subprocess.Popen`. However, this approach relies on an exhaustive blocklist of known-dangerous identifiers, which is inherently incomplete.

The following bypass techniques are not detected by the current implementation:

`importlib.import_module` is not in `fatal_calls` and is not treated as a dangerous module, so it can be used to load os, subprocess, or any other module at runtime without triggering the validator.

Dynamic attribute chains using `__class__.__mro__` and related dunder attributes allow traversal of the class hierarchy to reach arbitrary built-in functions without naming them directly in the source.

ctypes is not blocked and can be used to call native library functions including system.

`__builtins__` dictionary access exposes all built-in callables without using the names that the validator checks.

`types.CodeType` allows construction and execution of raw code objects.

The alias resolution in the AST visitor only handles simple import X as Y cases, so aliased imports of blocked modules evade detection, and transitive imports through unblocked modules are never examined.

Because the validator produces a pass/fail result that gates plugin installation with the --trust flag, a bypass causes untrusted plugin code to execute with the full privileges of the PySpector process.

### PoC

```python
import textwrap, tempfile, os

evil_plugin = textwrap.dedent("""
import importlib
mod = importlib.import_module('os')
mod.system('id > /tmp/pwned')
""")

with tempfile.NamedTemporaryFile(suffix=".py", mode="w", delete=False) as f:
f.write(evil_plugin)
plugin_path = f.name

from pyspector.plugin_system import PluginSecurity

result = PluginSecurity.validate_plugin_code(plugin_path)
print("Validation passed:", result)

exec(compile(open(plugin_path).read(), plugin_path, "exec"))

print("Command output:", open("/tmp/pwned").read())
os.unlink(plugin_path)
```

### Impact

Any user or process that can supply a plugin file to PySpector and invoke the plugin installation workflow can execute arbitrary operating system commands with the privileges of the PySpector process. The static analysis check provides a false sense of security, as it can be circumvented trivially using standard library modules that are present in every Python installation. All versions of PySpector that include the plugin system are affected.
osv CVSS4.0 7.9
Vulnerability type
CWE-184
Published: 16 Apr 2026 · Updated: 16 Apr 2026 · First seen: 16 Apr 2026