CVE-2026-32640

EUVD-2026-12142
SimpleEval is a library for adding evaluatable expressions into python projects. Prior to 1.0.5, objects (including modules) can leak dangerous modules through to direct access inside the sandbox. If the objects you've passed in as names to SimpleEval have modules or other disallowed / dangerous objects available as attrs. Additionally, dangerous functions or modules could be accessed by passing them as callbacks to other safe functions to call. The latest version 1.0.5 has this issue fixed. This vulnerability is fixed in 1.0.5.
Code Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 15%
Affected Products (NVD)
VendorProductVersion
danthedeckiesimpleeval
𝑥
< 1.0.5
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
simpleeval
bookworm
vulnerable
bookworm (security)
0.9.12-1+deb12u1
fixed
bullseye
vulnerable
bullseye (security)
0.9.10-1+deb11u1
fixed
forky
1.0.7-1
fixed
sid
1.0.7-1
fixed
trixie
vulnerable
trixie (security)
1.0.3-1+deb13u1
fixed