Home

Description

Grist is spreadsheet software using Python as its formula language. Grist offers several methods for running those formulas in a sandbox, for cases where the user may be working with untrusted spreadsheets. One such method runs them in pyodide, but pyodide on node does not have a useful sandbox barrier. If a user of Grist sets `GRIST_SANDBOX_FLAVOR` to `pyodide` and opens a malicious document, that document could run arbitrary processes on the server hosting Grist. The problem has been addressed in Grist version 1.7.9 and up, by running pyodide under deno. As a workaround, a user can use the gvisor-based sandbox by setting `GRIST_SANDBOX_FLAVOR` to `gvisor`.

PUBLISHED Reserved 2026-01-19 | Published 2026-01-22 | Updated 2026-01-22 | Assigner GitHub_M




CRITICAL: 9.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Product status

< 1.7.9
affected

References

github.com/...t-core/security/advisories/GHSA-7xvx-8pf2-pv5g

support.getgrist.com/self-managed/

cve.org (CVE-2026-24002)

nvd.nist.gov (CVE-2026-24002)

Download JSON