Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Grist-Core Vulnerability Allows RCE Attacks via Spreadsheet Formulas

Critical Grist-Core Vulnerability Allows RCE Attacks via Spreadsheet Formulas

Posted on January 27, 2026January 27, 2026 By CWS

Ravie LakshmananJan 27, 2026Vulnerability / Cloud Safety

A essential safety flaw has been disclosed in Grist‑Core, an open-source, self-hosted model of the Grist relational spreadsheet-database, that might lead to distant code execution.
The vulnerability, tracked as CVE-2026-24002 (CVSS rating: 9.1), has been codenamed Cellbreak by Cyera Analysis Labs.
“One malicious method can flip a spreadsheet right into a Distant Code Execution (RCE) beachhead,” safety researcher Vladimir Tokarev, who found the flaw, stated. “This sandbox escape lets a method creator execute OS instructions or run host‑runtime JavaScript, collapsing the boundary between ‘cell logic’ and host execution.”

Cellbreak is categorized as a case of Pyodide sandbox escape, the identical type of vulnerability that additionally not too long ago impacted n8n (CVE-2025-68668, CVSS rating: 9.9, aka N8scape). The vulnerability has been addressed in model 1.7.9, launched on January 9, 2026.
“A safety evaluate recognized a vulnerability within the ‘pyodide’ sandboxing technique that’s out there in Grist,” the mission maintainers stated. “You’ll be able to verify if you’re affected within the sandboxing part of the Admin Panel of your occasion. Should you see ‘gvisor’ there, then you aren’t affected. Should you see ‘pyodide,’ then it is very important replace to this model of Grist or later.”
In a nutshell, the issue is rooted in Grist’s Python method execution, which permits untrusted formulation to be run inside Pyodide, a Python distribution that permits common Python code to be executed instantly in an internet browser throughout the confines of a WebAssembly (WASM) sandbox.

Whereas the thought behind this thought course of is to make sure that Python method code is run in an remoted surroundings, the truth that Grist makes use of a blocklist-style method makes it attainable to flee the sandbox and finally obtain command execution on the underlying host.
“The sandbox’s design permits traversal by means of Python’s class hierarchy and leaves ctypes out there, which collectively open entry to Emscripten runtime features that ought to by no means be reachable from a method cell,” Tokarev defined. “That mixture allows host command execution and JavaScript execution within the host runtime, with sensible outcomes like filesystem entry and secret publicity.”

In line with Grist, when a consumer has set GRIST_SANDBOX_FLAVOR to Pyodide and opens a malicious doc, that doc could possibly be used to run arbitrary processes on the server internet hosting Grist. Armed with this functionality to execute instructions or JavaScript through a method, an attacker can leverage this habits to entry database credentials and API keys, learn delicate recordsdata, and current lateral motion alternatives.

Grist has addressed the issue by transferring Pyodide method execution beneath the Deno JavaScript runtime by default. Nonetheless, it is value noting that the danger rears its head as soon as once more if an operator explicitly chooses to set GRIST_PYODIDE_SKIP_DENO to the worth “1.” The setting must be prevented in situations the place untrusted or semi‑trusted formulation are prone to be run.
Customers are advisable to replace to the most recent model as quickly as attainable to mitigate potential dangers. To briefly mitigate the problem, it is suggested to set the GRIST_SANDBOX_FLAVOR surroundings variable to “gvisor.”
“This mirrors the systemic danger present in different automation platforms: a single execution floor with privileged entry can collapse organizational belief boundaries when its sandbox fails,” Tokarev stated.
“When method execution depends on a permissive sandbox, a single escape can flip ‘knowledge logic’ into ‘host execution.’ The Grist-Core findings present why sandboxing must be capability-based and defense-in-depth, not a fragile blocklist. The price of failure isn’t just a bug – it’s a data-plane breach.”

The Hacker News Tags:Attacks, Critical, Formulas, GristCore, RCE, Spreadsheet, Vulnerability

Post navigation

Previous Post: Node.js 25.5.0 Released Update Root Certificates and New Command-Line Flags
Next Post: Organizations Warned of Exploited Linux Vulnerabilities

Related Posts

Meta Disrupts Influence Ops Targeting Romania, Azerbaijan, and Taiwan with Fake Personas Meta Disrupts Influence Ops Targeting Romania, Azerbaijan, and Taiwan with Fake Personas The Hacker News
Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data The Hacker News
New FileFix Method Emerges as a Threat Following 517% Rise in ClickFix Attacks New FileFix Method Emerges as a Threat Following 517% Rise in ClickFix Attacks The Hacker News
Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network The Hacker News
Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns The Hacker News
Chinese TA415 Uses VS Code Remote Tunnels to Spy on U.S. Economic Policy Experts Chinese TA415 Uses VS Code Remote Tunnels to Spy on U.S. Economic Policy Experts The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News