VYPR
Medium severity6.1OSV Advisory· Published Nov 29, 2024· Updated Apr 15, 2026

CVE-2024-39162

CVE-2024-39162

Description

pyspider through 0.3.10 allows /update XSS. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

pyspider through 0.3.10 contains a stored XSS vulnerability in the /update endpoint, enabling arbitrary JavaScript execution.

Vulnerability

CVE-2024-39162 is a stored cross-site scripting (XSS) vulnerability in pyspider through version 0.3.10, specifically in the /update endpoint of the web UI. The vulnerability stems from insufficient sanitization of user-supplied input, allowing attackers to inject malicious scripts that are later rendered in the browser of an authenticated victim [1][3].

Exploitation

An attacker can craft a malicious payload and submit it via the /update feature; the payload is stored and executed when a victim accesses affected pages. No special privileges beyond the ability to reach the web UI are required, though an authenticated victim must trigger the stored script. The web UI may operate without authentication or with weak HTTP Basic Authentication, lowering the barrier for initial access [1][2].

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's session. This can lead to session hijacking, defacement, or redirection to malicious sites. Because pyspider's web UI also permits script editing and task management, an XSS chain could potentially escalate to more severe actions if combined with other weaknesses [1][4].

Mitigation

The maintainer has archived the GitHub repository and is no longer providing patches. Users are strongly advised to deprecate use of pyspider or, if unavoidable, isolate the web UI with strong authentication and restrict network access to trusted hosts only [1][3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
pyspiderPyPI
<= 0.3.10

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.