Impact
The flaw lies in the _is_safe_ast routine of AntaresMugisho PyBlade, where custom abstract‑syntax‑tree elements are not correctly neutralised by the sandbox during rendering. This oversight allows an attacker to inject syntax that the engine processes as ordinary code, potentially enabling code execution or other malicious behaviours. The advisory confirms the vulnerability can be leveraged remotely by submitting crafted templates, so an attacker does not need local filesystem access to initiate the attack.
Affected Systems
The product impacted is AntaresMugisho PyBlade, specifically the 0.1.8‑alpha and 0.1.9‑alpha releases. No other vendors or product variations are recorded as affected.
Risk and Exploitability
The CVSS score of 5.3 positions the vulnerability as moderate severity. Though an EPSS estimate is not publicly available, the issue has been publicly disclosed and is not listed in the CISA KEV catalogue, meaning attackers may still target it. The remote nature of the attackable vector increases its threat profile, and the absence of an available vendor patch keeps the risk persistent until remediation is applied.
OpenCVE Enrichment
Github GHSA