Impact
Pip versions prior to 26.1 contain a flaw where the self‑update routine runs after wheel files are installed, at which point it imports well‑known Python modules. The flaw relies on CWE‑829, which concerns the import of untrusted input. If a malicious wheel is installed, the subsequent import of that wheel’s modules can execute arbitrary code during the self‑update process, potentially compromising the system on which pip runs.
Affected Systems
Python installers that use pip before version 26.1, including the official pip packages distributed by the pip maintainers, and any custom builds that bundle an older pip executable.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity. No EPSS score data is available, and the vulnerability is not listed in CISA's KEV catalog, suggesting it has not yet been widely exploited. However, the required conditions – the presence of a malicious wheel file and execution of a self‑update – are achievable by a local user with package installation privileges. Consequently, the risk is moderate and mitigation through an official patch is recommended.
OpenCVE Enrichment