Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Arbitrary Code Execution vulnerabilities in an interactive lesson.
Start learningUpgrade pip
to version 25.0 or higher.
Affected versions of this package are vulnerable to Arbitrary Code Execution by implanting a malicious wheel file in pip's installation directory, which will replace the module being installed and get executed during installation.
Note: The specific vulnerable behavior arises because pip._internal.self_outdated_check
is loaded after a module is installed, which is fixed in the 25.0 release of pip. However, the assumption of a trusted environment and trusted install files is still maintained and measures must therefore be taken outside the scope of pip to fully secure it against local threats.