No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Scoder
Scoder lupa |
|
| Weaknesses | CWE-914 | |
| Vendors & Products |
Scoder
Scoder lupa |
|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 06 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 06 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Lupa integrates the runtimes of Lua or LuaJIT2 into CPython. In 2.6 and earlier, attribute_filter is not consistently applied when attributes are accessed through built-in functions like getattr and setattr. This allows an attacker to bypass the intended restrictions and eventually achieve arbitrary code execution. | |
| Title | Lupa has a Sandbox escape and RCE due to incomplete attribute_filter enforcement in getattr / setattr | |
| Weaknesses | CWE-284 CWE-639 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-06T18:37:15.583Z
Reserved: 2026-03-27T18:18:14.894Z
Link: CVE-2026-34444
Updated: 2026-04-06T18:37:12.215Z
Status : Received
Published: 2026-04-06T16:16:35.717
Modified: 2026-04-06T16:16:35.717
Link: CVE-2026-34444
OpenCVE Enrichment
Updated: 2026-04-06T21:32:15Z