Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24049: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in pypa wheel

0
High
VulnerabilityCVE-2026-24049cvecve-2026-24049cwe-22cwe-732
Published: Thu Jan 22 2026 (01/22/2026, 04:02:08 UTC)
Source: CVE Database V5
Vendor/Project: pypa
Product: wheel

Description

wheel is a command line tool for manipulating Python wheel files, as defined in PEP 427. In versions 0.40.0 through 0.46.1, the unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts. This issue has been fixed in version 0.46.2.

AI-Powered Analysis

AILast updated: 01/29/2026, 08:25:25 UTC

Technical Analysis

CVE-2026-24049 is a path traversal vulnerability categorized under CWE-22 and CWE-732 affecting the Python wheel tool, a command line utility used to manipulate Python wheel files as per PEP 427. The vulnerability exists in versions 0.40.0 through 0.46.1 within the unpack function. During extraction, the tool sanitizes file paths to prevent directory traversal, but subsequently, it performs a chmod operation on filenames directly taken from the archive header without revalidating the path. This discrepancy allows an attacker to craft a malicious wheel archive containing filenames that, when unpacked, cause the tool to modify permissions on arbitrary files outside the intended extraction directory. Critical system files such as /etc/passwd, SSH private keys, or configuration files can be made writable or executable, enabling privilege escalation or arbitrary code execution. The attack vector requires an attacker to supply a malicious wheel file and convince a user or automated process to unpack it, implying local access and user interaction. The vulnerability does not require prior authentication but does require the victim to run the vulnerable unpack operation. The issue was addressed in version 0.46.2 by ensuring that permission changes respect sanitized paths and do not affect files outside the intended directory. No known exploits are reported in the wild as of publication.

Potential Impact

For European organizations, the impact of CVE-2026-24049 can be significant, particularly for those relying on Python for development, deployment, or automation workflows involving wheel files. The vulnerability allows attackers to escalate privileges or execute arbitrary code by modifying critical system files, potentially leading to full system compromise. This risk is heightened in environments where wheel files are unpacked automatically or by less privileged users with access to sensitive systems. Organizations running Linux-based infrastructure are especially vulnerable due to the presence of typical Unix file paths like /etc/passwd. The compromise of system files or SSH keys can lead to lateral movement, data breaches, or disruption of services. Given the widespread use of Python in European tech sectors, finance, healthcare, and government, exploitation could affect critical infrastructure and sensitive data. However, exploitation requires local access and user interaction, somewhat limiting remote attack feasibility but not eliminating insider threat or supply chain risks.

Mitigation Recommendations

To mitigate CVE-2026-24049, European organizations should immediately upgrade the wheel tool to version 0.46.2 or later where the vulnerability is fixed. Additionally, organizations should audit and restrict the sources of wheel files used in their environments, ensuring only trusted packages are unpacked. Implement strict file system permissions and sandboxing for unpack operations to limit the impact of any malicious file permission changes. Employ monitoring and alerting on changes to critical system files such as /etc/passwd and SSH keys. Incorporate security scanning in CI/CD pipelines to detect vulnerable wheel versions and malicious packages. Educate developers and system administrators about the risks of unpacking untrusted wheel files. Finally, consider using containerization or virtual environments to isolate unpacking processes, reducing the risk of system-wide compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-20T22:30:11.778Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6971a92c4623b1157c3a86c9

Added to database: 1/22/2026, 4:35:56 AM

Last enriched: 1/29/2026, 8:25:25 AM

Last updated: 2/7/2026, 10:10:42 AM

Views: 354

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats