Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13327: Improper Validation of Syntactic Correctness of Input in astral-sh uv

0
Medium
VulnerabilityCVE-2025-13327cvecve-2025-13327
Published: Fri Feb 27 2026 (02/27/2026, 07:30:20 UTC)
Source: CVE Database V5
Vendor/Project: astral-sh
Product: uv

Description

A flaw was found in uv. This vulnerability allows an attacker to execute malicious code during package resolution or installation via specially crafted ZIP (Zipped Information Package) archives that exploit parsing differentials, requiring user interaction to install an attacker-controlled package.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/18/2026, 18:28:04 UTC

Technical Analysis

CVE-2025-13327 is a vulnerability identified in the astral-sh uv package, specifically related to improper validation of the syntactic correctness of input ZIP archives during package resolution or installation. The flaw arises because the package's parsing mechanism does not correctly handle certain crafted ZIP files, allowing attackers to exploit parsing differentials. This can lead to execution of malicious code embedded within the ZIP archive when the package is resolved or installed. Exploitation requires the victim to interact by installing a package controlled by the attacker, and the attacker must have high privileges on the system, indicating that local privilege or prior access is necessary. The vulnerability affects version 0 of the uv package, with no patches currently available. The CVSS 3.1 base score is 6.3, reflecting a medium severity rating, with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H), but mitigated by the need for high attack complexity, privileges, and user interaction. No known exploits have been reported in the wild yet. This vulnerability is significant because it can lead to arbitrary code execution during a common software management operation, potentially compromising systems that rely on astral-sh uv for package management or deployment.

Potential Impact

The vulnerability allows attackers to execute arbitrary code during package installation, which can compromise system confidentiality, integrity, and availability. Organizations using astral-sh uv in their software development, continuous integration/continuous deployment (CI/CD) pipelines, or package management processes could face risks of unauthorized code execution, leading to data breaches, system compromise, or disruption of services. Since exploitation requires user interaction and high privileges, the threat is more pronounced in environments where users have elevated rights or where automated processes run with such privileges. The lack of patches increases exposure until mitigations are applied. The potential impact includes insertion of backdoors, data exfiltration, or sabotage of software supply chains, which can have cascading effects on dependent systems and services.

Mitigation Recommendations

1. Restrict package installation privileges to the minimum necessary, avoiding running package managers with elevated or root privileges unless absolutely required. 2. Implement strict validation and verification of package sources, using cryptographic signatures and trusted repositories only. 3. Employ sandboxing or containerization for package installation processes to limit the scope of potential code execution. 4. Monitor package installation logs and system behavior for anomalies indicative of exploitation attempts. 5. Educate users and administrators about the risks of installing untrusted packages and the importance of verifying package authenticity. 6. Follow updates from the astral-sh project and apply patches promptly once available. 7. Consider using alternative package management tools or versions if feasible until the vulnerability is resolved. 8. Integrate static and dynamic analysis tools in CI/CD pipelines to detect suspicious package contents before deployment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-11-17T17:35:36.702Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a14e1a32ffcdb8a203afb2

Added to database: 2/27/2026, 7:56:10 AM

Last enriched: 3/18/2026, 6:28:04 PM

Last updated: 4/14/2026, 5:14:17 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses