Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-r5pr-887v-m2w9 | Stored XSS in Memray-generated HTML reports via unescaped command-line metadata |
Thu, 19 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:bloomberg:memray:*:*:*:*:*:python:*:* |
Thu, 19 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Mar 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bloomberg
Bloomberg memray |
|
| Vendors & Products |
Bloomberg
Bloomberg memray |
Wed, 18 Mar 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Memray is a memory profiler for Python. Prior to Memray 1.19.2, Memray rendered the command line of the tracked process directly into generated HTML reports without escaping. Because there was no escaping, attacker-controlled command line arguments were inserted as raw HTML into the generated report. This allowed JavaScript execution when a victim opened the generated report in a browser. Version 1.19.2 fixes the issue. | |
| Title | Memray-generated HTML reports vulnerable to Stored XSS via unescaped command-line metadata | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-19T17:39:50.970Z
Reserved: 2026-03-13T15:02:00.625Z
Link: CVE-2026-32722
Updated: 2026-03-19T17:39:47.037Z
Status : Analyzed
Published: 2026-03-18T22:16:24.670
Modified: 2026-03-19T19:21:28.677
Link: CVE-2026-32722
No data.
OpenCVE Enrichment
Updated: 2026-03-25T11:52:08Z
Github GHSA