Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. mesop
  4. ›
  5. CVE-2025-30358

CVE-2025-30358: Mesop Class Pollution vulnerability leads to DoS and Jailbreak attacks

March 27, 2025

From @jackfromeast and @superboy-zjc: We have identified a class pollution vulnerability in Mesop (<= 0.14.0) application that allows attackers to overwrite global variables and class attributes in certain Mesop modules during runtime. This vulnerability could directly lead to a denial of service (DoS) attack against the server. Additionally, it could also result in other severe consequences given the application’s implementation, such as identity confusion, where an attacker could impersonate an assistant or system role within conversations. This impersonation could potentially enable jailbreak attacks when interacting with large language models (LLMs).

Just like the Javascript’s prototype pollution, this vulnerability could leave a way for attackers to manipulate the intended data-flow or control-flow of the application at runtime and lead to severe consequnces like RCE when gadgets are available.

References

  • github.com/advisories/GHSA-f3mf-hm6v-jfhh
  • github.com/mesop-dev/mesop
  • github.com/mesop-dev/mesop/commit/748e20d4a363d89b841d62213f5b0c6b4bed788f
  • github.com/mesop-dev/mesop/security/advisories/GHSA-f3mf-hm6v-jfhh
  • nvd.nist.gov/vuln/detail/CVE-2025-30358

Code Behaviors & Features

Detect and mitigate CVE-2025-30358 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.14.1

Fixed versions

  • 0.14.1

Solution

Upgrade to version 0.14.1 or above.

Impact 8.1 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes

Source file

pypi/mesop/CVE-2025-30358.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 00:14:57 +0000.