CVE-2025-30358 – mesop
Package
Manager: pip
Name: mesop
Vulnerable Version: >=0 <0.14.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00538 pctl0.6659
Details
Mesop Class Pollution vulnerability leads to DoS and Jailbreak attacks From @jackfromeast and @superboy-zjc: We have identified a class pollution vulnerability in Mesop (<= [0.14.0](https://github.com/mesop-dev/mesop/releases/tag/v0.14.0)) application that allows attackers to overwrite global variables and class attributes in certain Mesop modules during runtime. This vulnerability could directly lead to a denial of service (DoS) attack against the server. Additionally, it could also result in other severe consequences given the application's implementation, such as identity confusion, where an attacker could impersonate an assistant or system role within conversations. This impersonation could potentially enable jailbreak attacks when interacting with large language models (LLMs). Just like the Javascript's prototype pollution, this vulnerability could leave a way for attackers to manipulate the intended data-flow or control-flow of the application at runtime and lead to severe consequnces like RCE when gadgets are available.
Metadata
Created: 2025-03-27T18:14:29Z
Modified: 2025-03-27T18:14:29Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-f3mf-hm6v-jfhh/GHSA-f3mf-hm6v-jfhh.json
CWE IDs: ["CWE-915"]
Alternative ID: GHSA-f3mf-hm6v-jfhh
Finding: F006
Auto approve: 1