๐Ÿ” CVE Alert

CVE-2026-32722

LOW 3.6

Memray-generated HTML reports vulnerable to Stored XSS via unescaped command-line metadata

CVSS Score
3.6
EPSS Score
0.0%
EPSS Percentile
0th

Memray is a memory profiler for Python. Prior to Memray 1.19.2, Memray rendered the command line of the tracked process directly into generated HTML reports without escaping. Because there was no escaping, attacker-controlled command line arguments were inserted as raw HTML into the generated report. This allowed JavaScript execution when a victim opened the generated report in a browser. Version 1.19.2 fixes the issue.

CWE CWE-79
Vendor bloomberg
Product memray
Published Mar 18, 2026
Last Updated Mar 19, 2026
Stay Ahead of the Next One

Get instant alerts for bloomberg memray

Be the first to know when new low vulnerabilities affecting bloomberg memray are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
None
Availability
None

Affected Versions

bloomberg / memray
< 1.19.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/bloomberg/memray/security/advisories/GHSA-r5pr-887v-m2w9 github.com: https://github.com/bloomberg/memray/commit/ba6e4e2e9930f9641bed7adfdf43c8e2545ce249 github.com: https://github.com/bloomberg/memray/releases/tag/v1.19.2