Directory Traversal Affecting python3.12-setuptools-wheel package, versions <0:68.2.2-5.el9_6


Severity

Recommended
medium

Based on AlmaLinux security rating.

Threat Intelligence

EPSS
0.14% (35th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Directory Traversal vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-ALMALINUX9-PYTHON312SETUPTOOLSWHEEL-11501937
  • published7 Aug 2025
  • disclosed21 Jul 2025

Introduced: 21 Jul 2025

NewCVE-2025-47273  (opens in a new tab)
CWE-22  (opens in a new tab)

How to fix?

Upgrade AlmaLinux:9 python3.12-setuptools-wheel to version 0:68.2.2-5.el9_6 or higher.
This issue was patched in ALSA-2025:12834.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python3.12-setuptools-wheel package and not the python3.12-setuptools-wheel package as distributed by AlmaLinux. See How to fix? for AlmaLinux:9 relevant fixed versions and status.

setuptools is a package that allows users to download, build, install, upgrade, and uninstall Python packages. A path traversal vulnerability in PackageIndex is present in setuptools prior to version 78.1.1. An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to remote code execution depending on the context. Version 78.1.1 fixes the issue.

CVSS Base Scores

version 3.1