Sandbox Escape Vulnerability in Heym Python Tool Executor
CVE-2026-45227

8.7HIGH

Key Information:

Vendor

Heymrun

Status
Vendor
CVE Published:
12 May 2026

What is CVE-2026-45227?

Heym versions prior to 0.0.21 exhibit a security flaw that enables authenticated workflow authors to evade sandbox protections. By leveraging Python's introspection capabilities, attackers can access the unrestricted import function, which allows them to import disallowed modules, including os and subprocess. This exploitation can lead to unauthorized access to sensitive backend environment variables such as database credentials and encryption keys. As a result, attackers may execute arbitrary commands on the host system with the privileges of the backend service user, posing significant risks to data integrity and system security.

Affected Version(s)

heym 0

heym 0 < 0.0.21

heym 32b7e809d987d9b018ec8daa2cdaf48f627f26f1

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Chia Min Jun Lennon
.