CVE-2026-6878
ByteDance verl grader.py math_equal sandbox
CVSS Score
5.6
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability was identified in ByteDance verl up to 0.7.0. Affected is the function math_equal of the file prime_math/grader.py. The manipulation leads to sandbox issue. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
| CWE | CWE-265 CWE-264 |
| Vendor | bytedance |
| Product | verl |
| Published | Apr 23, 2026 |
Stay Ahead of the Next One
Get instant alerts for bytedance verl
Be the first to know when new medium vulnerabilities affecting bytedance verl are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
ByteDance / verl
0.1 0.2 0.3 0.4 0.5 0.6 0.7.0
References
Credits
๐ ZAST.AI (VulDB User) VulDB CNA Team