CVE-2026-24049: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in pypa wheel
wheel is a command line tool for manipulating Python wheel files, as defined in PEP 427. In versions 0.40.0 through 0.46.1, the unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts. This issue has been fixed in version 0.46.2.
AI Analysis
Technical Summary
CVE-2026-24049 is a path traversal vulnerability categorized under CWE-22 and CWE-732 affecting the Python wheel tool, a command line utility used to manipulate Python wheel files as per PEP 427. The vulnerability exists in versions 0.40.0 through 0.46.1 within the unpack function. During extraction, the tool sanitizes file paths to prevent directory traversal, but subsequently, it performs a chmod operation on filenames directly taken from the archive header without revalidating the path. This discrepancy allows an attacker to craft a malicious wheel archive containing filenames that, when unpacked, cause the tool to modify permissions on arbitrary files outside the intended extraction directory. Critical system files such as /etc/passwd, SSH private keys, or configuration files can be made writable or executable, enabling privilege escalation or arbitrary code execution. The attack vector requires an attacker to supply a malicious wheel file and convince a user or automated process to unpack it, implying local access and user interaction. The vulnerability does not require prior authentication but does require the victim to run the vulnerable unpack operation. The issue was addressed in version 0.46.2 by ensuring that permission changes respect sanitized paths and do not affect files outside the intended directory. No known exploits are reported in the wild as of publication.
Potential Impact
For European organizations, the impact of CVE-2026-24049 can be significant, particularly for those relying on Python for development, deployment, or automation workflows involving wheel files. The vulnerability allows attackers to escalate privileges or execute arbitrary code by modifying critical system files, potentially leading to full system compromise. This risk is heightened in environments where wheel files are unpacked automatically or by less privileged users with access to sensitive systems. Organizations running Linux-based infrastructure are especially vulnerable due to the presence of typical Unix file paths like /etc/passwd. The compromise of system files or SSH keys can lead to lateral movement, data breaches, or disruption of services. Given the widespread use of Python in European tech sectors, finance, healthcare, and government, exploitation could affect critical infrastructure and sensitive data. However, exploitation requires local access and user interaction, somewhat limiting remote attack feasibility but not eliminating insider threat or supply chain risks.
Mitigation Recommendations
To mitigate CVE-2026-24049, European organizations should immediately upgrade the wheel tool to version 0.46.2 or later where the vulnerability is fixed. Additionally, organizations should audit and restrict the sources of wheel files used in their environments, ensuring only trusted packages are unpacked. Implement strict file system permissions and sandboxing for unpack operations to limit the impact of any malicious file permission changes. Employ monitoring and alerting on changes to critical system files such as /etc/passwd and SSH keys. Incorporate security scanning in CI/CD pipelines to detect vulnerable wheel versions and malicious packages. Educate developers and system administrators about the risks of unpacking untrusted wheel files. Finally, consider using containerization or virtual environments to isolate unpacking processes, reducing the risk of system-wide compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland, Belgium, Italy
CVE-2026-24049: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in pypa wheel
Description
wheel is a command line tool for manipulating Python wheel files, as defined in PEP 427. In versions 0.40.0 through 0.46.1, the unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts. This issue has been fixed in version 0.46.2.
AI-Powered Analysis
Technical Analysis
CVE-2026-24049 is a path traversal vulnerability categorized under CWE-22 and CWE-732 affecting the Python wheel tool, a command line utility used to manipulate Python wheel files as per PEP 427. The vulnerability exists in versions 0.40.0 through 0.46.1 within the unpack function. During extraction, the tool sanitizes file paths to prevent directory traversal, but subsequently, it performs a chmod operation on filenames directly taken from the archive header without revalidating the path. This discrepancy allows an attacker to craft a malicious wheel archive containing filenames that, when unpacked, cause the tool to modify permissions on arbitrary files outside the intended extraction directory. Critical system files such as /etc/passwd, SSH private keys, or configuration files can be made writable or executable, enabling privilege escalation or arbitrary code execution. The attack vector requires an attacker to supply a malicious wheel file and convince a user or automated process to unpack it, implying local access and user interaction. The vulnerability does not require prior authentication but does require the victim to run the vulnerable unpack operation. The issue was addressed in version 0.46.2 by ensuring that permission changes respect sanitized paths and do not affect files outside the intended directory. No known exploits are reported in the wild as of publication.
Potential Impact
For European organizations, the impact of CVE-2026-24049 can be significant, particularly for those relying on Python for development, deployment, or automation workflows involving wheel files. The vulnerability allows attackers to escalate privileges or execute arbitrary code by modifying critical system files, potentially leading to full system compromise. This risk is heightened in environments where wheel files are unpacked automatically or by less privileged users with access to sensitive systems. Organizations running Linux-based infrastructure are especially vulnerable due to the presence of typical Unix file paths like /etc/passwd. The compromise of system files or SSH keys can lead to lateral movement, data breaches, or disruption of services. Given the widespread use of Python in European tech sectors, finance, healthcare, and government, exploitation could affect critical infrastructure and sensitive data. However, exploitation requires local access and user interaction, somewhat limiting remote attack feasibility but not eliminating insider threat or supply chain risks.
Mitigation Recommendations
To mitigate CVE-2026-24049, European organizations should immediately upgrade the wheel tool to version 0.46.2 or later where the vulnerability is fixed. Additionally, organizations should audit and restrict the sources of wheel files used in their environments, ensuring only trusted packages are unpacked. Implement strict file system permissions and sandboxing for unpack operations to limit the impact of any malicious file permission changes. Employ monitoring and alerting on changes to critical system files such as /etc/passwd and SSH keys. Incorporate security scanning in CI/CD pipelines to detect vulnerable wheel versions and malicious packages. Educate developers and system administrators about the risks of unpacking untrusted wheel files. Finally, consider using containerization or virtual environments to isolate unpacking processes, reducing the risk of system-wide compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-20T22:30:11.778Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6971a92c4623b1157c3a86c9
Added to database: 1/22/2026, 4:35:56 AM
Last enriched: 1/29/2026, 8:25:25 AM
Last updated: 2/6/2026, 7:51:05 PM
Views: 352
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2064: Cross Site Scripting in Portabilis i-Educar
MediumCVE-2026-25727: CWE-121: Stack-based Buffer Overflow in time-rs time
MediumCVE-2026-25643: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in blakeblackshear frigate
CriticalCVE-2026-1709: Key Exchange without Entity Authentication in Red Hat Red Hat Enterprise Linux 10
CriticalCVE-2025-15320: Multiple Binds to the Same Port in Tanium Tanium Client
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.