Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-69v7-xpr6-6gjm | Lupa has a Sandbox escape and RCE due to incomplete attribute_filter enforcement in getattr / setattr |
Fri, 01 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:scoder:lupa:*:*:*:*:*:python:*:* | |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Scoder
Scoder lupa |
|
| Weaknesses | CWE-914 | |
| Vendors & Products |
Scoder
Scoder lupa |
|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 06 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 06 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Lupa integrates the runtimes of Lua or LuaJIT2 into CPython. In 2.6 and earlier, attribute_filter is not consistently applied when attributes are accessed through built-in functions like getattr and setattr. This allows an attacker to bypass the intended restrictions and eventually achieve arbitrary code execution. | |
| Title | Lupa has a Sandbox escape and RCE due to incomplete attribute_filter enforcement in getattr / setattr | |
| Weaknesses | CWE-284 CWE-639 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-06T18:37:15.583Z
Reserved: 2026-03-27T18:18:14.894Z
Link: CVE-2026-34444
Updated: 2026-04-06T18:37:12.215Z
Status : Analyzed
Published: 2026-04-06T16:16:35.717
Modified: 2026-05-01T19:54:12.063
Link: CVE-2026-34444
OpenCVE Enrichment
Updated: 2026-04-07T06:54:59Z
Github GHSA