Arbitrary Code Execution Affecting pip package, versions [24.1b1,25.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Execution vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-PIP-8685043
  • published2 Feb 2025
  • disclosed1 Feb 2025
  • creditUnknown

Introduced: 1 Feb 2025

New CVE NOT AVAILABLE CWE-94  (opens in a new tab)

How to fix?

Upgrade pip to version 25.0 or higher.

Overview

Affected versions of this package are vulnerable to Arbitrary Code Execution by implanting a malicious wheel file in pip's installation directory, which will replace the module being installed and get executed during installation.

Note: The specific vulnerable behavior arises because pip._internal.self_outdated_check is loaded after a module is installed, which is fixed in the 25.0 release of pip. However, the assumption of a trusted environment and trusted install files is still maintained and measures must therefore be taken outside the scope of pip to fully secure it against local threats.

References

CVSS Scores

version 4.0
version 3.1