Memray is a memory profiler for Python. Prior to Memray 1.19.2, Memray rendered the command line of the tracked process directly into generated HTML reports without escaping. Because there was no escaping, attacker-controlled command line arguments were inserted as raw HTML into the generated report. This allowed JavaScript execution when a victim opened the generated report in a browser. Version 1.19.2 fixes the issue.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-r5pr-887v-m2w9 Stored XSS in Memray-generated HTML reports via unescaped command-line metadata
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 19 Mar 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Bloomberg
Bloomberg memray
Vendors & Products Bloomberg
Bloomberg memray

Wed, 18 Mar 2026 21:30:00 +0000

Type Values Removed Values Added
Description Memray is a memory profiler for Python. Prior to Memray 1.19.2, Memray rendered the command line of the tracked process directly into generated HTML reports without escaping. Because there was no escaping, attacker-controlled command line arguments were inserted as raw HTML into the generated report. This allowed JavaScript execution when a victim opened the generated report in a browser. Version 1.19.2 fixes the issue.
Title Memray-generated HTML reports vulnerable to Stored XSS via unescaped command-line metadata
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 3.6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-18T21:25:21.495Z

Reserved: 2026-03-13T15:02:00.625Z

Link: CVE-2026-32722

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-18T22:16:24.670

Modified: 2026-03-18T22:16:24.670

Link: CVE-2026-32722

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-19T08:55:26Z

Weaknesses