Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-45227— Heym < 0.0.21 Sandbox Escape via Python Introspection

CVSS 8.8 · High EPSS 0.04% · P14
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-45227

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Heym < 0.0.21 Sandbox Escape via Python Introspection
Source: NVD (National Vulnerability Database)
Vulnerability Description
Heym before 0.0.21 contains a sandbox escape vulnerability in the custom Python tool executor that allows authenticated workflow authors to bypass sandbox restrictions by using object-graph introspection primitives. Attackers can use Python introspection techniques to recover the unrestricted __import__ function, import blocked modules such as os and subprocess, and access inherited backend environment variables containing database credentials and encryption keys to execute arbitrary host commands as the backend service user.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
保护机制失效
Source: NVD (National Vulnerability Database)
Vulnerability Title
Heym 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Heym是heymrun开源的一个AI原生工作流自动化平台。 Heym 0.0.21之前版本存在安全漏洞,该漏洞源于自定义Python工具执行器中存在沙箱逃逸,可能导致经过身份验证的工作流作者通过对象图内省原语绕过沙箱限制。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
heymrunheym 0 ~ 0.0.21 -

II. Public POCs for CVE-2026-45227

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium
Qwen3.6-35B-A3B · 6685 chars
Paid plan includes:
In-depth vulnerability mechanism
Trigger conditions & impact
Full executable POC code
Exploit chain & mitigation
POC zip download
100+ AI POC generations per month

III. Intelligence Information for CVE-2026-45227

登录查看更多情报信息。

Same Patch Batch · heymrun · 2026-05-12 · 3 CVEs total

CVE-2026-452257.6 HIGHHeym < 0.0.21 Path Traversal File Upload via upload_file()
CVE-2026-452267.1 HIGHHeym < 0.0.21 Authorization Bypass in Workflow Execution

IV. Related Vulnerabilities

V. Comments for CVE-2026-45227

No comments yet


Leave a comment