Critical Grist-Core Vulnerability Allows RCE Attacks via Spreadsheet Formulas
嗯,用户让我帮忙总结一篇文章,控制在一百个字以内,而且不需要用“文章内容总结”这样的开头。首先,我需要仔细阅读这篇文章,理解它的主要内容。 文章讲的是Grist-Core这个开源软件的一个安全漏洞,编号是CVE-2026-24002,CVSS评分9.1。这个漏洞被称为Cellbreak,由Cyera Research Labs发现。漏洞允许远程代码执行,影响了使用Pyodide沙盒的版本。攻击者可以通过恶意公式执行系统命令或JavaScript代码,导致数据泄露和权限提升。Grist已经发布了1.7.9版本修复了这个问题,并建议用户更新或设置环境变量来临时缓解问题。 接下来,我需要将这些信息浓缩到一百字以内。要抓住关键点:漏洞名称、影响、攻击方式、修复措施以及建议。同时要避免使用过于专业的术语,让总结更易懂。 可能的结构是:Grist-Core存在严重漏洞(CVE编号),允许远程代码执行。攻击者利用恶意公式获取权限。已修复于1.7.9版本,并建议更新或设置环境变量。 现在检查字数是否符合要求,并确保信息准确无误。 </think> Grist-Core存在严重漏洞(CVE-2026-24002),允许远程代码执行。攻击者可通过恶意公式获取系统权限,访问敏感数据。已修复于1.7.9版本,并建议用户更新或设置环境变量以缓解风险。 2026-1-27 10:36:0 Author: thehackernews.com(查看原文) 阅读量:3 收藏

Vulnerability / Cloud Security

A critical security flaw has been disclosed in Grist‑Core, an open-source, self-hosted version of the Grist relational spreadsheet-database, that could result in remote code execution.

The vulnerability, tracked as CVE-2026-24002 (CVSS score: 9.1), has been codenamed Cellbreak by Cyera Research Labs.

"One malicious formula can turn a spreadsheet into a Remote Code Execution (RCE) beachhead," security researcher Vladimir Tokarev, who discovered the flaw, said. "This sandbox escape lets a formula author execute OS commands or run host‑runtime JavaScript, collapsing the boundary between 'cell logic' and host execution."

Cybersecurity

Cellbreak is categorized as a case of Pyodide sandbox escape, the same kind of vulnerability that also recently impacted n8n (CVE-2025-68668, CVSS score: 9.9, aka N8scape). The vulnerability has been addressed in version 1.7.9, released on January 9, 2026.

"A security review identified a vulnerability in the 'pyodide' sandboxing method that is available in Grist," the project maintainers said. "You can check if you are affected in the sandboxing section of the Admin Panel of your instance. If you see 'gvisor' there, then you are not affected. If you see 'pyodide,' then it is important to update to this version of Grist or later."

In a nutshell, the problem is rooted in Grist's Python formula execution, which allows untrusted formulas to be run inside Pyodide, a Python distribution that enables regular Python code to be executed directly in a web browser within the confines of a WebAssembly (WASM) sandbox.

While the idea behind this thought process is to ensure that Python formula code is run in an isolated environment, the fact that Grist uses a blocklist-style approach makes it possible to escape the sandbox and ultimately achieve command execution on the underlying host.

"The sandbox's design allows traversal through Python's class hierarchy and leaves ctypes available, which together open access to Emscripten runtime functions that should never be reachable from a formula cell," Tokarev explained. "That combination enables host command execution and JavaScript execution in the host runtime, with practical outcomes like filesystem access and secret exposure."

According to Grist, when a user has set GRIST_SANDBOX_FLAVOR to Pyodide and opens a malicious document, that document could be used to run arbitrary processes on the server hosting Grist. Armed with this capability to execute commands or JavaScript via a formula, an attacker can leverage this behavior to access database credentials and API keys, read sensitive files, and present lateral movement opportunities.

Cybersecurity

Grist has addressed the problem by moving Pyodide formula execution under the Deno JavaScript runtime by default. However, it's worth noting that the risk rears its head once again if an operator explicitly chooses to set GRIST_PYODIDE_SKIP_DENO to the value "1." The setting should be avoided in scenarios where untrusted or semi‑trusted formulas are likely to be run.

Users are recommended to update to the latest version as soon as possible to mitigate potential risks. To temporarily mitigate the issue, it's advised to set the GRIST_SANDBOX_FLAVOR environment variable to "gvisor."

"This mirrors the systemic risk found in other automation platforms: a single execution surface with privileged access can collapse organizational trust boundaries when its sandbox fails," Tokarev said.

"When formula execution relies on a permissive sandbox, a single escape can turn 'data logic' into 'host execution.' The Grist-Core findings show why sandboxing needs to be capability-based and defense-in-depth, not a fragile blocklist. The cost of failure is not just a bug - it is a data-plane breach."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/critical-grist-core-vulnerability.html
如有侵权请联系:admin#unsafe.sh