We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-30358

Mesop Class Pollution vulnerability leads to DoS and Jailbreak attacks



Description

Mesop is a Python-based UI framework that allows users to build web applications. A class pollution vulnerability in Mesop prior to version 0.14.1 allows attackers to overwrite global variables and class attributes in certain Mesop modules during runtime. This vulnerability could directly lead to a denial of service (DoS) attack against the server. Additionally, it could also result in other severe consequences given the application's implementation, such as identity confusion, where an attacker could impersonate an assistant or system role within conversations. This impersonation could potentially enable jailbreak attacks when interacting with large language models (LLMs). Just like the Javascript's prototype pollution, this vulnerability could leave a way for attackers to manipulate the intended data-flow or control-flow of the application at runtime and lead to severe consequences like remote code execution when gadgets are available. Users should upgrade to version 0.14.1 to obtain a fix for the issue.

Reserved 2025-03-21 | Published 2025-03-27 | Updated 2025-03-27 | Assigner GitHub_M


HIGH: 8.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Problem types

CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes

Product status

< 0.14.1
affected

References

github.com/.../mesop/security/advisories/GHSA-f3mf-hm6v-jfhh

github.com/...ommit/748e20d4a363d89b841d62213f5b0c6b4bed788f

cve.org (CVE-2025-30358)

nvd.nist.gov (CVE-2025-30358)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-30358

Support options

Helpdesk Chat, Email, Knowledgebase