Description
A vulnerability has been found in AntaresMugisho PyBlade 0.1.8-alpha/0.1.9-alpha. The affected element is the function _is_safe_ast of the file sandbox.py of the component AST Validation. Such manipulation leads to improper neutralization of special elements used in a template engine. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-04-05
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Template Injection
Action: Apply Patch
AI Analysis

Impact

The flaw lies in the _is_safe_ast routine of AntaresMugisho PyBlade, where custom abstract‑syntax‑tree elements are not correctly neutralised by the sandbox during rendering. This oversight allows an attacker to inject syntax that the engine processes as ordinary code, potentially enabling code execution or other malicious behaviours. The advisory confirms the vulnerability can be leveraged remotely by submitting crafted templates, so an attacker does not need local filesystem access to initiate the attack.

Affected Systems

The product impacted is AntaresMugisho PyBlade, specifically the 0.1.8‑alpha and 0.1.9‑alpha releases. No other vendors or product variations are recorded as affected.

Risk and Exploitability

The CVSS score of 5.3 positions the vulnerability as moderate severity. Though an EPSS estimate is not publicly available, the issue has been publicly disclosed and is not listed in the CISA KEV catalogue, meaning attackers may still target it. The remote nature of the attackable vector increases its threat profile, and the absence of an available vendor patch keeps the risk persistent until remediation is applied.

Generated by OpenCVE AI on April 5, 2026 at 14:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official vendor patch for PyBlade when it becomes available.
  • Until a patch is released, limit PyBlade usage to strictly trusted templates and avoid rendering user‑supplied content.
  • Sanitise any template input or disable features that allow special element processing within the engine.
  • Monitor the project's repository and security advisories for updates, and apply the patch promptly when released.

Generated by OpenCVE AI on April 5, 2026 at 14:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-23jg-5f8m-gw8c PyBlade: SSTI/RCE via Bypassed AST Validation in sandbox.py
History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Antaresmugisho
Antaresmugisho pyblade
Vendors & Products Antaresmugisho
Antaresmugisho pyblade

Mon, 06 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 10:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in AntaresMugisho PyBlade 0.1.8-alpha/0.1.9-alpha. The affected element is the function _is_safe_ast of the file sandbox.py of the component AST Validation. Such manipulation leads to improper neutralization of special elements used in a template engine. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title AntaresMugisho PyBlade AST Validation sandbox.py _is_safe_ast special elements used in a template engine
Weaknesses CWE-1336
CWE-791
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Antaresmugisho Pyblade
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T16:19:35.483Z

Reserved: 2026-04-04T13:54:35.492Z

Link: CVE-2026-5559

cve-icon Vulnrichment

Updated: 2026-04-06T16:19:31.227Z

cve-icon NVD

Status : Deferred

Published: 2026-04-05T11:16:55.900

Modified: 2026-04-24T18:14:34.620

Link: CVE-2026-5559

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:56:54Z

Weaknesses