Impact
The vulnerability resides in the wheel command line tool, which handles Python wheel files. In wheel versions 0.40.0 through 0.46.1, the unpack routine incorrectly trusts the filename supplied in the archive header when performing a chmod operation, even after sanitizing the extraction path. Malicious wheel files can be crafted to alter the permissions of critical system files such as /etc/passwd, SSH keys, or configuration scripts. An attacker who can execute the unpack operation may gain write access to executable files and then modify them to run arbitrary code, thereby achieving privilege escalation or remote code execution. This flaw corresponds to file‑system path traversal and improper permission handling weaknesses.
Affected Systems
All installations of the wheel package from the wheel project, specifically pypa:wheel, that use wheel versions 0.40.0 through 0.46.1. Environments where wheel is employed to unpack distributions—such as development machines, CI pipelines, and deployment automation—are affected.
Risk and Exploitability
The CVSS base score of 7.1 indicates a high denial or modification risk. The EPSS score is below 1%, suggesting a low probability of widespread exploitation at present, and no listing in the CISA KEV catalog. Based on the description, the likely attack vector is local, requiring an attacker to run the wheel unpack command with a crafted wheel file. If wheel is used in a CI or automated deployment scenario, the threat could become semi‑remote as the automation process executes the unpack. The exploit requires the ability to run the wheel tool and sufficient permissions to reach the target system's filesystem, but does not require elevated privileges to initiate the attack.
OpenCVE Enrichment
Github GHSA
Ubuntu USN