Interpretation Conflict Affecting uv package, versions [,0.8.6)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Interpretation Conflict vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-UV-11509795
  • published8 Aug 2025
  • disclosed7 Aug 2025
  • creditCaleb Brown, Tim Hatch

Introduced: 7 Aug 2025

NewCVE-2025-54368  (opens in a new tab)
CWE-20  (opens in a new tab)
CWE-436  (opens in a new tab)

How to fix?

Upgrade uv to version 0.8.6 or higher.

Overview

uv is an An extremely fast Python package and project manager, written in Rust.

Affected versions of this package are vulnerable to Interpretation Conflict via improper handling of ZIP archives during the installation process. An attacker can cause malicious code to be executed by crafting a ZIP archive with multiple local file entries or stacked internal ZIPs that are parsed differently by various installers. This can be exploited when a user installs a package from a malicious ZIP archive and subsequently imports or executes the installed package.

Note:

This is only exploitable if a user installs a package from an attacker-controlled ZIP archive and performs an action that triggers code execution, such as importing the package.

CVSS Base Scores

version 4.0
version 3.1