Description
D-Tale is the combination of a Flask back-end and a React front-end to view & analyze Pandas data structures. Prior to 3.22.0, users hosting D-Tale publicly while using a redis or shelf storage layer could be vulnerable to remote code execution allowing attackers to run malicious code on the server. This vulnerability is fixed in 3.22.0.
Published: 2026-04-06
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A flaw in D‑Tale versions prior to 3.22.0 enables attackers who can reach the publicly exposed Flask backend while a redis or shelf storage layer is in use to execute arbitrary code on the host. The vulnerability is provisioned through improperly handled data stored in redis or shelf, effectively allowing remote code execution. The input lists CWE‑79 and NVD-CWE-noinfo; the description indicates a severe execution flaw rather than a rendering issue.

Affected Systems

The affected product is the D‑Tale framework developed by man‑group. Any installation of D‑Tale running a version older than 3.22.0 that uses redis or shelf for storage and is exposed to external traffic is vulnerable. No specific vendor versions beyond the major release boundary are listed, so all pre‑3.22.0 releases that meet these conditions are included.

Risk and Exploitability

The CVSS score of 5.3 classifies the vulnerability as medium severity, yet the impact of remote code execution remains high. Exploitation requires that the target be publicly reachable and that the attacker can influence input stored via redis or shelf. The EPSS score is reported as less than 1%, and the vulnerability is not listed in CISA KEV, indicating no known widespread exploitation yet. The attack vector is inferred to be remote, network‑based against the web interface.

Generated by OpenCVE AI on April 21, 2026 at 00:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade D‑Tale to version 3.22.0 or later to resolve the vulnerability.
  • If an upgrade is not immediately possible, limit access to the D‑Tale instance behind a firewall or reverse proxy and disable public exposure of the Flask application.
  • Switch storage away from redis or shelf until the patch is applied, or enforce strict access controls on those storage layers.
  • Monitor application logs for unusual activity suggesting attempts to manipulate storage content.
  • Refer to the GitHub advisory link for detailed patching guidance.

Generated by OpenCVE AI on April 21, 2026 at 00:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-436g-fhfc-9g5w D-Tale: Remote Code Execution through redis/shelf storage
History

Mon, 20 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Man
Man d-tale
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:man:d-tale:*:*:*:*:*:*:*:*
Vendors & Products Man
Man d-tale
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Man-group
Man-group dtale
Vendors & Products Man-group
Man-group dtale

Mon, 06 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description D-Tale is the combination of a Flask back-end and a React front-end to view & analyze Pandas data structures. Prior to 3.22.0, users hosting D-Tale publicly while using a redis or shelf storage layer could be vulnerable to remote code execution allowing attackers to run malicious code on the server. This vulnerability is fixed in 3.22.0.
Title D-Tale affected by Remote Code Execution through redis/shelf storage
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T15:59:35.529Z

Reserved: 2026-03-31T21:06:06.429Z

Link: CVE-2026-35052

cve-icon Vulnrichment

Updated: 2026-04-07T15:18:43.993Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T18:16:42.747

Modified: 2026-04-20T18:36:34.007

Link: CVE-2026-35052

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T00:15:16Z

Weaknesses