CVE-2026-24049: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in pypa wheel
CVE-2026-24049 is a high-severity path traversal vulnerability in the Python wheel tool (versions below 0. 46. 2) that allows attackers to manipulate file permissions of critical system files during wheel extraction. The flaw arises because the unpack function trusts filenames from the archive header for chmod operations without proper validation, potentially enabling privilege escalation or arbitrary code execution. Exploitation requires local access and user interaction to unpack a crafted malicious wheel file. The vulnerability has been fixed in version 0. 46. 2. European organizations using vulnerable wheel versions in development or deployment pipelines are at risk, especially those with sensitive system files and automated build environments. Mitigation involves upgrading to wheel 0.
AI Analysis
Technical Summary
CVE-2026-24049 is a path traversal vulnerability classified under CWE-22 and CWE-732 affecting the Python wheel package management tool, specifically versions prior to 0.46.2. The vulnerability resides in the unpack function, which improperly handles file permissions after extracting files from a wheel archive. Although the extraction process sanitizes file paths to prevent directory traversal, the subsequent chmod operation blindly trusts the filename from the archive header. This discrepancy allows an attacker to craft a malicious wheel file containing filenames that, when unpacked, modify permissions of arbitrary files outside the intended extraction directory, including critical system files such as /etc/passwd, SSH keys, or configuration files. By changing these files' permissions to writable, an attacker can escalate privileges or execute arbitrary code by modifying scripts or binaries that the system or users trust. Exploitation requires local access and user interaction to unpack the malicious wheel file, but no prior authentication is needed. The vulnerability has a CVSS 3.1 score of 7.1, indicating high severity due to its impact on integrity and availability, ease of exploitation with low attack complexity, and no privileges required. No known exploits are reported in the wild as of the publication date. The issue was addressed in wheel version 0.46.2 by properly validating file paths and permissions during unpacking to prevent unauthorized permission changes.
Potential Impact
For European organizations, this vulnerability poses significant risks, particularly in environments where Python wheel files are unpacked automatically or manually, such as development, continuous integration/continuous deployment (CI/CD) pipelines, and production systems. Successful exploitation can lead to privilege escalation, allowing attackers to gain higher system privileges and potentially full control over affected machines. This could result in unauthorized access to sensitive data, disruption of services, or persistent backdoors. Critical infrastructure sectors relying on Python for automation, orchestration, or application deployment are especially vulnerable. Additionally, organizations with strict compliance requirements (e.g., GDPR) may face legal and reputational consequences if this vulnerability leads to data breaches or system compromises. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments with multiple users or shared systems.
Mitigation Recommendations
1. Upgrade all instances of the wheel package to version 0.46.2 or later immediately to ensure the vulnerability is patched. 2. Audit and inventory all systems and environments where wheel is used, including developer workstations, build servers, and production environments, to identify vulnerable versions. 3. Restrict permissions on directories where wheel files are unpacked to limit the ability to modify critical system files. 4. Implement strict validation and sandboxing of wheel files before unpacking, especially those obtained from untrusted sources. 5. Incorporate security scanning tools in CI/CD pipelines to detect vulnerable wheel versions and malicious wheel files. 6. Educate developers and system administrators about the risks of unpacking untrusted wheel files and enforce policies to avoid such practices. 7. Monitor system logs and file permission changes for suspicious activity indicative of exploitation attempts. 8. Consider using containerization or isolated environments for unpacking wheel files to limit the blast radius of potential exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain, Poland
CVE-2026-24049: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in pypa wheel
Description
CVE-2026-24049 is a high-severity path traversal vulnerability in the Python wheel tool (versions below 0. 46. 2) that allows attackers to manipulate file permissions of critical system files during wheel extraction. The flaw arises because the unpack function trusts filenames from the archive header for chmod operations without proper validation, potentially enabling privilege escalation or arbitrary code execution. Exploitation requires local access and user interaction to unpack a crafted malicious wheel file. The vulnerability has been fixed in version 0. 46. 2. European organizations using vulnerable wheel versions in development or deployment pipelines are at risk, especially those with sensitive system files and automated build environments. Mitigation involves upgrading to wheel 0.
AI-Powered Analysis
Technical Analysis
CVE-2026-24049 is a path traversal vulnerability classified under CWE-22 and CWE-732 affecting the Python wheel package management tool, specifically versions prior to 0.46.2. The vulnerability resides in the unpack function, which improperly handles file permissions after extracting files from a wheel archive. Although the extraction process sanitizes file paths to prevent directory traversal, the subsequent chmod operation blindly trusts the filename from the archive header. This discrepancy allows an attacker to craft a malicious wheel file containing filenames that, when unpacked, modify permissions of arbitrary files outside the intended extraction directory, including critical system files such as /etc/passwd, SSH keys, or configuration files. By changing these files' permissions to writable, an attacker can escalate privileges or execute arbitrary code by modifying scripts or binaries that the system or users trust. Exploitation requires local access and user interaction to unpack the malicious wheel file, but no prior authentication is needed. The vulnerability has a CVSS 3.1 score of 7.1, indicating high severity due to its impact on integrity and availability, ease of exploitation with low attack complexity, and no privileges required. No known exploits are reported in the wild as of the publication date. The issue was addressed in wheel version 0.46.2 by properly validating file paths and permissions during unpacking to prevent unauthorized permission changes.
Potential Impact
For European organizations, this vulnerability poses significant risks, particularly in environments where Python wheel files are unpacked automatically or manually, such as development, continuous integration/continuous deployment (CI/CD) pipelines, and production systems. Successful exploitation can lead to privilege escalation, allowing attackers to gain higher system privileges and potentially full control over affected machines. This could result in unauthorized access to sensitive data, disruption of services, or persistent backdoors. Critical infrastructure sectors relying on Python for automation, orchestration, or application deployment are especially vulnerable. Additionally, organizations with strict compliance requirements (e.g., GDPR) may face legal and reputational consequences if this vulnerability leads to data breaches or system compromises. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments with multiple users or shared systems.
Mitigation Recommendations
1. Upgrade all instances of the wheel package to version 0.46.2 or later immediately to ensure the vulnerability is patched. 2. Audit and inventory all systems and environments where wheel is used, including developer workstations, build servers, and production environments, to identify vulnerable versions. 3. Restrict permissions on directories where wheel files are unpacked to limit the ability to modify critical system files. 4. Implement strict validation and sandboxing of wheel files before unpacking, especially those obtained from untrusted sources. 5. Incorporate security scanning tools in CI/CD pipelines to detect vulnerable wheel versions and malicious wheel files. 6. Educate developers and system administrators about the risks of unpacking untrusted wheel files and enforce policies to avoid such practices. 7. Monitor system logs and file permission changes for suspicious activity indicative of exploitation attempts. 8. Consider using containerization or isolated environments for unpacking wheel files to limit the blast radius of potential exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-20T22:30:11.778Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6971a92c4623b1157c3a86c9
Added to database: 1/22/2026, 4:35:56 AM
Last enriched: 1/22/2026, 4:50:15 AM
Last updated: 1/22/2026, 6:46:31 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-23807: CWE-416 Use After Free in Apache Software Foundation Apache Xerces C++
HighCVE-2026-24042: CWE-862: Missing Authorization in appsmithorg appsmith
CriticalCVE-2026-24039: CWE-284: Improper Access Control in horilla-opensource horilla
MediumCVE-2026-24038: CWE-287: Improper Authentication in horilla-opensource horilla
HighCVE-2026-24037: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in horilla-opensource horilla
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.