We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-47273

setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write



Description

setuptools is a package that allows users to download, build, install, upgrade, and uninstall Python packages. A path traversal vulnerability in `PackageIndex` is present in setuptools prior to version 78.1.1. An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to remote code execution depending on the context. Version 78.1.1 fixes the issue.

Reserved 2025-05-05 | Published 2025-05-17 | Updated 2025-05-28 | Assigner GitHub_M


HIGH: 7.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

< 78.1.1
affected

References

github.com/...ptools/security/advisories/GHSA-5rjg-fvgr-3xxf

github.com/pypa/setuptools/issues/4946

github.com/...ommit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b

github.com/...5b1bffc163f56fd558/setuptools/package_index.py

cve.org (CVE-2025-47273)

nvd.nist.gov (CVE-2025-47273)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-47273

Support options

Helpdesk Chat, Email, Knowledgebase