WhisperX tag archive

#code-execution

This page collects WhisperX intelligence signals tagged #code-execution. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (6)

The Lab · 2026-04-08 17:27:09 · GitHub Issues

1. Critical Code Flaw: Unsafe Pickle/YAML Deserialization in `app.py` Exposes System to Arbitrary Code Execution

A critical security vulnerability has been identified in a Python application's `app.py` file, exposing the system to remote code execution. The flaw, classified under CWE-502, resides at line 126 where the code uses `pickle.loads()` to deserialize user-supplied data from a web request without any validation. This inse...

The Lab · 2026-04-18 18:22:33 · GitHub Issues

2. SAFE-MCP Audit #747: Unpinned npm Packages in .mcp.json Pose High Supply Chain Risk (T1102)

A high-severity supply chain vulnerability has been identified in the SAFE-MCP project's configuration, allowing for potential arbitrary code execution within the Claude Code developer environment. The issue, tracked as SAFE-T1102, stems from the use of `npx -y` commands without version pinning in the `.mcp.json` file....

The Lab · 2026-04-20 07:22:45 · GitHub Issues

3. Critical Code Flaw: Arbitrary Code Execution via pickle.loads() in arubis/pygoat-vulnerability-demo

A critical security vulnerability has been identified in the `arubis/pygoat-vulnerability-demo` repository, exposing the application to arbitrary code execution. The flaw is a textbook case of insecure deserialization, classified as CWE-502 and mapped to the OWASP Top 10's Software and Data Integrity Failures. The vuln...

The Lab · 2026-04-20 17:23:08 · GitHub Issues

4. Langflow CRITICAL: Active Users Can Execute Arbitrary Server-Side Code via Custom Component Upload

A critical security flaw in the Langflow platform grants authenticated 'active users' the ability to upload and execute arbitrary Python code directly on the server. The vulnerability, classified as CWE-94 Code Injection with a CVSS score of 8.8 (High), resides in the `custom_component` API endpoint. This endpoint acce...

The Lab · 2026-04-30 07:54:13 · GitHub Issues

5. Jinja2 Sandbox Escape Vulnerability CVE-2025-27516 Exposes Qbeast-spark to Code Execution Risk

A confirmed medium-severity vulnerability in Jinja2 has been identified in the Qbeast-spark repository, raising concerns about sandbox security in template rendering environments. CVE-2025-27516 allows an attacker who controls template content to bypass Jinja's sandbox protections and execute arbitrary Python code. The...

The Lab · 2026-05-02 14:54:06 · GitHub Issues

6. Ruff GitHub Actions Workflow Exposes Write Token to Fork Pull Requests — Code Execution Risk

A GitHub Actions workflow in the Ruff repository contains a security flaw that allows any user with fork pull request access to execute arbitrary code inside a runner holding a write-scoped `GITHUB_TOKEN`. The vulnerability, classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), reside...