Vulnerability Description
Mesa is an open-source Python library for agent-based modeling, simulating complex systems and exploring emergent behaviors. In version 3.5.0 and prior, checking out of untrusted code in benchmarks.yml workflow may lead to code execution in privileged runner. This issue has been patched via commit c35b8cd.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mesa Project | Mesa | <= 3.5.0 |
Related Weaknesses (CWE)
References
- https://github.com/mesa/mesa/commit/c35b8cd67fc89dd680ae218e49b77f6e1ee07a27Patch
- https://github.com/mesa/mesa/security/advisories/GHSA-3j55-5q6x-2h48Vendor AdvisoryMitigation
FAQ
What is CVE-2026-29075?
CVE-2026-29075 is a vulnerability with a CVSS score of 8.3 (HIGH). Mesa is an open-source Python library for agent-based modeling, simulating complex systems and exploring emergent behaviors. In version 3.5.0 and prior, checking out of untrusted code in benchmarks.ym...
How severe is CVE-2026-29075?
CVE-2026-29075 has been rated HIGH with a CVSS base score of 8.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-29075?
Check the references section above for vendor advisories and patch information. Affected products include: Mesa Project Mesa.