top of page
perceptive_background_267k.jpg

wheel is a command line tool for manipulating Python wheel files, as defined in PEP 427. In versions 0.46.1 and below, the unpack function is vulnerable to file…

Published:

21 januari 2026 om 23:00:00

Alert date:

22 januari 2026 om 07:01:05

Source:

nvd.nist.gov

Click to open the original link from this advisory

Supply Chain & Dependencies

CVE-2026-24049 affects the Python wheel command line tool versions 0.46.1 and below. The vulnerability exists in the unpack function which mishandles file permissions after extraction. The flaw allows attackers to craft malicious wheel files that can change permissions of critical system files like /etc/passwd, SSH keys, and config files when unpacked. This can lead to privilege escalation or arbitrary code execution by making system scripts writable. The issue has been patched in version 0.46.2.

Technical details

Mitigation steps:

Affected products:

Python wheel

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page