CVE-2024-39162
Description
pyspider through 0.3.10 allows /update XSS. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
pyspider through 0.3.10 contains a stored XSS vulnerability in the /update endpoint, enabling arbitrary JavaScript execution.
Vulnerability
CVE-2024-39162 is a stored cross-site scripting (XSS) vulnerability in pyspider through version 0.3.10, specifically in the /update endpoint of the web UI. The vulnerability stems from insufficient sanitization of user-supplied input, allowing attackers to inject malicious scripts that are later rendered in the browser of an authenticated victim [1][3].
Exploitation
An attacker can craft a malicious payload and submit it via the /update feature; the payload is stored and executed when a victim accesses affected pages. No special privileges beyond the ability to reach the web UI are required, though an authenticated victim must trigger the stored script. The web UI may operate without authentication or with weak HTTP Basic Authentication, lowering the barrier for initial access [1][2].
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's session. This can lead to session hijacking, defacement, or redirection to malicious sites. Because pyspider's web UI also permits script editing and task management, an XSS chain could potentially escalate to more severe actions if combined with other weaknesses [1][4].
Mitigation
The maintainer has archived the GitHub repository and is no longer providing patches. Users are strongly advised to deprecate use of pyspider or, if unavoidable, isolate the web UI with strong authentication and restrict network access to trusted hosts only [1][3].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
pyspiderPyPI | <= 0.3.10 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-x4x5-jx9j-mmv7ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-39162ghsaADVISORY
- docs.pyspider.org/en/latestghsaWEB
- www.sonarsource.com/blog/basic-http-authentication-risk-uncovering-pyspider-vulnerabilitiesghsaWEB
- docs.pyspider.org/en/latest/nvd
- www.sonarsource.com/blog/basic-http-authentication-risk-uncovering-pyspider-vulnerabilities/nvd
News mentions
0No linked articles in our index yet.