Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Critical Remote Code Execution in SuperDuper Query Parser |
Wed, 13 May 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Remote Code Execution via Unsafe Eval in superduper Query Parser | |
| Weaknesses | CWE-95 |
Wed, 13 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Superduper-io
Superduper-io superduper |
|
| Vendors & Products |
Superduper-io
Superduper-io superduper |
Tue, 12 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Remote Code Execution via Unsafe Eval in superduper Query Parser | |
| Weaknesses | CWE-94 CWE-95 |
Tue, 12 May 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The superduper project thru v0.10.0 contains a critical remote code execution vulnerability in its query parsing component. The _parse_op_part() function in query.py uses the unsafe eval() function to dynamically evaluate user-supplied query operands without proper sanitization or restriction. Although the function attempts to limit the execution context by providing a restricted global namespace, it does not block access to dangerous built-in functions. A remote attacker can exploit this by submitting a specially crafted query string containing Python code that imports modules (e.g., os) and executes arbitrary system commands, leading to complete compromise of the server. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-13T13:04:44.955Z
Reserved: 2026-03-09T00:00:00.000Z
Link: CVE-2026-31225
Updated: 2026-05-13T13:01:45.707Z
Status : Awaiting Analysis
Published: 2026-05-12T16:16:14.430
Modified: 2026-05-13T15:52:25.637
Link: CVE-2026-31225
No data.
OpenCVE Enrichment
Updated: 2026-05-13T18:30:46Z