Cyber Posture

CVE-2026-32640

Critical

Published: 16 March 2026

Published
16 March 2026
Modified
21 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0005 15.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Python commands and scripts for execution.

Security Summary

CVE-2026-32640 is a sandbox escape vulnerability in SimpleEval, a Python library designed for safely evaluating mathematical expressions in projects. Versions prior to 1.0.5 allow objects passed as names to the evaluator to leak dangerous modules or other disallowed objects through direct attribute access within the sandbox. Additionally, attackers can access hazardous functions or modules by passing them as callbacks to otherwise safe functions.

The vulnerability can be exploited remotely by unauthenticated attackers with low complexity and no user interaction required, as indicated by its CVSS 3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Exploitation occurs if an attacker can influence the objects provided as names or callbacks to SimpleEval, enabling them to bypass sandbox restrictions and access sensitive modules or execute arbitrary dangerous code, potentially leading to high confidentiality, integrity, and availability impacts (mapped to CWE-94 and CWE-915).

The GitHub security advisory (GHSA-44vg-5wv2-h2hg) confirms the issue is fully resolved in SimpleEval version 1.0.5, recommending immediate upgrades for all prior versions to mitigate the sandbox bypass risks.

Details

CWE(s)
CWE-94CWE-915

Affected Products

danthedeckie
simpleeval
≤ 1.0.5

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.006 Python Execution
Adversaries may abuse Python commands and scripts for execution.
Why these techniques?

Remote unauthenticated RCE via sandbox escape in Python library enables exploitation of public-facing applications (T1190) and abuse of Python interpreter (T1059.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References