Home

Description

PyVista provides 3D plotting and mesh analysis through an interface for the Visualization Toolkit (VTK). Version 0.46.3 of the PyVista Project is vulnerable to remote code execution via dependency confusion. Two pieces of code use`--extra-index-url`. But when `--extra-index-url` is used, pip always checks for the PyPI index first, and then the external index. One package listed in the code is not published in PyPI. If an attacker publishes a package with higher version in PyPI, the malicious code from the attacker controlled package may be pulled, leading to remote code execution and a supply chain attack. As of time of publication, a patched version is unavailable.

PUBLISHED Reserved 2025-09-30 | Published 2025-10-06 | Updated 2025-10-07 | Assigner GitHub_M




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-94: Improper Control of Generation of Code ('Code Injection')

Product status

= 0.46.3
affected

References

github.com/...yvista/security/advisories/GHSA-xr7f-qcjc-63rv

github.com/...ommit/aabfb3db2b0d4980de9e94e66272240efba4ed95

github.com/...4a1/.devcontainer/offscreen/oncreatecommand.sh

github.com/...eb574dc3336de1a946f14a1/docker/slim.Dockerfile

cve.org (CVE-2025-61774)

nvd.nist.gov (CVE-2025-61774)

Download JSON