CVE-2024-12215: CWE-94 Improper Control of Generation of Code in kedro-org kedro-org/kedro
In kedro-org/kedro version 0.19.8, the `pull_package()` API function allows users to download and extract micro packages from the Internet. However, the function `project_wheel_metadata()` within the code path can execute the `setup.py` file inside the tar file, leading to remote code execution (RCE) by running arbitrary commands on the victim's machine.
AI Analysis
Technical Summary
CVE-2024-12215 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code) affecting kedro-org/kedro, an open-source Python framework for creating reproducible, maintainable, and modular data science code. The vulnerability exists in version 0.19.8 within the pull_package() API function, which is designed to download and extract micro packages from external sources. The core issue lies in the project_wheel_metadata() function, which processes the downloaded tarball and executes the setup.py script contained within it without sufficient validation or sandboxing. This execution of arbitrary Python code embedded in setup.py leads to remote code execution (RCE) on the host system. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), such as invoking the vulnerable API with a malicious package URL. The vulnerability impacts confidentiality, integrity, and availability, as an attacker can run arbitrary commands, potentially leading to data theft, system compromise, or denial of service. No patches or mitigations are currently linked, and no known exploits have been reported in the wild, but the high CVSS score (8.8) indicates a serious threat. This vulnerability is particularly dangerous in environments where Kedro is used to automate data workflows that pull external packages, as it can be exploited by supplying a crafted package containing malicious setup.py code.
Potential Impact
For European organizations, the impact of CVE-2024-12215 can be substantial, especially for those relying on Kedro for data science, machine learning pipelines, or ETL processes. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary code, steal sensitive data, manipulate datasets, or disrupt critical workflows. This can affect confidentiality by exposing proprietary data or intellectual property, integrity by altering data processing pipelines, and availability by causing system outages or denial of service. Organizations in sectors such as finance, healthcare, manufacturing, and research that use Kedro in production environments are at higher risk. Additionally, the vulnerability could be leveraged as a foothold for lateral movement within networks. The lack of authentication requirements and the network-based attack vector increase the risk of exploitation from remote attackers, including supply chain attackers who might inject malicious packages. Given the growing adoption of data science tools in Europe, the threat could have wide-reaching consequences if not addressed promptly.
Mitigation Recommendations
To mitigate CVE-2024-12215, European organizations should immediately audit their use of Kedro, especially version 0.19.8 or earlier, and restrict or disable the pull_package() API function if possible. Until an official patch is released, organizations should implement strict validation and whitelisting of package sources to prevent downloading untrusted or malicious packages. Running Kedro processes with least privilege and within isolated environments or containers can limit the impact of potential exploitation. Monitoring network traffic and API calls for unusual package download activity can help detect exploitation attempts. Organizations should also educate developers and data scientists about the risks of executing code from untrusted sources and enforce policies to avoid automatic execution of setup.py scripts from external packages. Regularly checking for updates from the Kedro project and applying security patches as soon as they become available is critical. Additionally, integrating runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions can help detect and block suspicious behavior related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2024-12215: CWE-94 Improper Control of Generation of Code in kedro-org kedro-org/kedro
Description
In kedro-org/kedro version 0.19.8, the `pull_package()` API function allows users to download and extract micro packages from the Internet. However, the function `project_wheel_metadata()` within the code path can execute the `setup.py` file inside the tar file, leading to remote code execution (RCE) by running arbitrary commands on the victim's machine.
AI-Powered Analysis
Technical Analysis
CVE-2024-12215 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code) affecting kedro-org/kedro, an open-source Python framework for creating reproducible, maintainable, and modular data science code. The vulnerability exists in version 0.19.8 within the pull_package() API function, which is designed to download and extract micro packages from external sources. The core issue lies in the project_wheel_metadata() function, which processes the downloaded tarball and executes the setup.py script contained within it without sufficient validation or sandboxing. This execution of arbitrary Python code embedded in setup.py leads to remote code execution (RCE) on the host system. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), such as invoking the vulnerable API with a malicious package URL. The vulnerability impacts confidentiality, integrity, and availability, as an attacker can run arbitrary commands, potentially leading to data theft, system compromise, or denial of service. No patches or mitigations are currently linked, and no known exploits have been reported in the wild, but the high CVSS score (8.8) indicates a serious threat. This vulnerability is particularly dangerous in environments where Kedro is used to automate data workflows that pull external packages, as it can be exploited by supplying a crafted package containing malicious setup.py code.
Potential Impact
For European organizations, the impact of CVE-2024-12215 can be substantial, especially for those relying on Kedro for data science, machine learning pipelines, or ETL processes. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary code, steal sensitive data, manipulate datasets, or disrupt critical workflows. This can affect confidentiality by exposing proprietary data or intellectual property, integrity by altering data processing pipelines, and availability by causing system outages or denial of service. Organizations in sectors such as finance, healthcare, manufacturing, and research that use Kedro in production environments are at higher risk. Additionally, the vulnerability could be leveraged as a foothold for lateral movement within networks. The lack of authentication requirements and the network-based attack vector increase the risk of exploitation from remote attackers, including supply chain attackers who might inject malicious packages. Given the growing adoption of data science tools in Europe, the threat could have wide-reaching consequences if not addressed promptly.
Mitigation Recommendations
To mitigate CVE-2024-12215, European organizations should immediately audit their use of Kedro, especially version 0.19.8 or earlier, and restrict or disable the pull_package() API function if possible. Until an official patch is released, organizations should implement strict validation and whitelisting of package sources to prevent downloading untrusted or malicious packages. Running Kedro processes with least privilege and within isolated environments or containers can limit the impact of potential exploitation. Monitoring network traffic and API calls for unusual package download activity can help detect exploitation attempts. Organizations should also educate developers and data scientists about the risks of executing code from untrusted sources and enforce policies to avoid automatic execution of setup.py scripts from external packages. Regularly checking for updates from the Kedro project and applying security patches as soon as they become available is critical. Additionally, integrating runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions can help detect and block suspicious behavior related to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-12-04T21:51:30.505Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b24178f764e1f470ae1
Added to database: 10/15/2025, 1:01:24 PM
Last enriched: 10/15/2025, 1:22:00 PM
Last updated: 10/16/2025, 12:42:22 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9955: Vulnerability in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-10611: Vulnerability in WSO2 WSO2 API Manager
CriticalCVE-2025-58426: Use of hard-coded cryptographic key in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-58079: Improper Protection of Alternate Path in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-55072: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.