Kritische Remote-Code-Ausführung in Grist - CVE-2026-24002

⚠️ CVE-Referenzen: CVE-2026-24002

Zusammenfassung

Eine kritische Sicherheitslücke in der Spreadsheet-Software Grist ermöglicht Angreifern die Ausführung von beliebigem Code auf dem Server. Das Problem betrifft Installationen, bei denen der `GRIST_SANDBOX_FLAVOR` auf `pyodide` gesetzt ist. Ein Patch ist in Version 1.7.9 verfügbar, alternativ kann der sicherere `gvisor`-Sandbox-Modus verwendet werden.

Grist is spreadsheet software using Python as its formula language. Grist offers several methods for running those formulas in a sandbox, for cases where the user may be working with untrusted spreadsheets. One such method runs them in pyodide, but pyodide on node does not have a useful sandbox barrier. If a user of Grist sets `GRIST_SANDBOX_FLAVOR` to `pyodide` and opens a malicious document, that document could run arbitrary processes on the server hosting Grist. The problem has been addressed in Grist version 1.7.9 and up, by running pyodide under deno. As a workaround, a user can use the gvisor-based sandbox by setting `GRIST_SANDBOX_FLAVOR` to `gvisor`.
Quelle: app.opencve.io