Class Pollution Affecting mesop package, versions [,0.14.1)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.32% (55th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Class Pollution vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-MESOP-9669339
  • published8 Apr 2025
  • disclosed27 Mar 2025
  • creditjackfromeast, superboy-zjc

Introduced: 27 Mar 2025

NewCVE-2025-30358  (opens in a new tab)
CWE-915  (opens in a new tab)

How to fix?

Upgrade mesop to version 0.14.1 or higher.

Overview

mesop is a Build UIs in Python

Affected versions of this package are vulnerable to Class Pollution in the _recursive_update_dataclass_from_json_obj() function, which doesn't raise an exception for dunder (__) properties. An attacker can cause denial of service by overwriting these elements, leading to server unresponsiveness. If the resulting values of these elements can be controlled in a given runtime, this could facilitate further exploits such as user impersonation and data corruption.

References

CVSS Base Scores

version 4.0
version 3.1