Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Pyodide Sandbox Escape Enables Remote Code Execution in Grist-Core
News

Pyodide Sandbox Escape Enables Remote Code Execution in Grist-Core

Team-CWDBy Team-CWDJanuary 27, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A critical sandbox escape vulnerability in Grist-Core has been disclosed that allows remote code execution (RCE) through a single malicious spreadsheet formula.

The issue was uncovered by Cyera Research Labs and affects Grist’s Python formula execution layer, where untrusted formulas are evaluated inside a Pyodide WebAssembly sandbox.

The flaw has been assigned a CVSS score of 9.1 and has now been patched following coordinated disclosure with the Grist-Core security team.

How Spreadsheet Data Became an Execution Vector

Grist-Core is a programmable alternative to Excel and Google Sheets, used to model data, automate workflows and build lightweight applications.

It is deployed both as a managed software-as-a-service (SaaS) offering and in self-hosted environments, placing it close to customer records, credentials and operational systems. That positioning significantly increases the impact of any failure in execution isolation.

The vulnerability allows a formula author to escape the Pyodide sandbox and execute operating system commands or JavaScript in the host runtime. Cyera Research Labs demonstrated that Python’s object model, combined with the availability of ctypes and exposed Emscripten runtime hooks, enables traversal paths that should not be reachable from a spreadsheet cell. As a result, routine data processing becomes an execution surface.

This approach is notable because it does not resemble traditional injection attacks. The exploit is delivered as legitimate spreadsheet content and follows the same data-processing paths Grist uses to evaluate formulas. Once the boundary collapses, the spreadsheet ceases to be a passive document and instead acts as a beachhead for host-level compromise.

Read more on malicious documents: TamperedChef Malvertising Campaign Drops Malware via Fake PDF Manuals

Why the SaaS Blast Radius Matters

The risk extends beyond individual servers. In managed SaaS deployments, formula execution occurs inside vendor-operated environments that hold customer data and integrations.

In that model, a sandbox escape is not just local RCE but a compromise inside the control plane that runs multiple tenants’ workflows. Grist effectively functions as a programmable data plane, sitting between SaaS systems, internal databases and operational processes.

Public information shows Grist adoption across government, including France’s public sector, more than 1000 higher-education organizations and commercial teams in marketing and game design. Cyera highlighted that these are production environments handling real operational data, not edge cases.

The vulnerability enables outcomes such as access to environment variables, sensitive configuration files and credentials, with potential for lateral movement into adjacent systems.

Grist fixed the issue in version 1.7.9 by running Pyodide under Deno by default, adding a permission-based isolation layer. Operators are advised to upgrade promptly, avoid bypassing Deno and treat formula execution as a privileged capability rather than ordinary spreadsheet content.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleExposure Assessment Platforms Signal a Shift in Focus
Next Article Drowning in spam or scam emails lately? Here’s why
Team-CWD
  • Website

Related Posts

News

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026
News

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
News

SolarWinds Web Help Desk Vulnerability Actively Exploited

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

What it is and how to protect yourself

January 8, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.