CVE-2021-32849
Python vulnerability analysis and mitigation

Overview

Gerapy, a distributed crawler management framework, was found to contain a critical security vulnerability (CVE-2021-32849) that allowed authenticated users to execute arbitrary commands on the system. The vulnerability was present in versions prior to 0.9.9 and was discovered by Rasmus Wriedt Larsen from the CodeQL Python team (GitHub Security Lab, CVE Mitre).

Technical details

The vulnerability existed in two functions: project_clone and project_parse. In project_clone, the address variable from POST requests was used unsafely in git clone commands, allowing command injection. Similarly, in project_parse, attacker-controlled data from POST requests could be used to execute arbitrary shell commands. The vulnerability was classified as CWE-78 (OS Command Injection) (GitHub Security Lab).

Impact

An authenticated attacker could execute arbitrary commands on the system hosting the Gerapy application, potentially leading to complete system compromise (GitHub Advisory).

Mitigation and workarounds

The vulnerability was fixed in version 0.9.9 of Gerapy. No known workarounds were available for earlier versions, making upgrading to version 0.9.9 or later the only effective mitigation (CVE Mitre).

Community reactions

The GitHub Security Lab initially reported the vulnerability on May 13, 2021, and after the standard 90-day disclosure period, proceeded with public disclosure on November 24, 2021, due to lack of response from the maintainers (GitHub Security Lab).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-5882-5rx9-xgxpCRITICAL10
  • PythonPython
  • crawl4ai
NoYesJan 16, 2026
GHSA-vx9w-5cx4-9796HIGH8.6
  • PythonPython
  • crawl4ai
NoYesJan 16, 2026
CVE-2026-23535HIGH8
  • PythonPython
  • wlc
NoYesJan 16, 2026
CVE-2026-23490HIGH7.5
  • PythonPython
  • pyasn1
NoYesJan 16, 2026
CVE-2026-23528MEDIUM5.3
  • PythonPython
  • distributed
NoYesJan 16, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management