Arbitrary Code Injection Affecting pyp2spec package, versions [,0.14.1)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (9th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-PYP2SPEC-16635284
  • published11 May 2026
  • disclosed4 May 2026
  • creditouldnicholas

Introduced: 4 May 2026

NewCVE-2026-42301  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade pyp2spec to version 0.14.1 or higher.

Overview

pyp2spec is a Generate a valid Fedora specfile from Python package from PyPI

Affected versions of this package are vulnerable to Arbitrary Code Injection in the process of writing package metadata into the generated spec file without escaping RPM macro directives. An attacker can execute arbitrary commands on the build machine by publishing a malicious package with crafted metadata fields that are evaluated during spec parsing.

CVSS Base Scores

version 4.0
version 3.1