Home

Description

virtualenv is a tool for creating isolated virtual python environments. Prior to version 20.36.1, TOCTOU (Time-of-Check-Time-of-Use) vulnerabilities in virtualenv allow local attackers to perform symlink-based attacks on directory creation operations. An attacker with local access can exploit a race condition between directory existence checks and creation to redirect virtualenv's app_data and lock file operations to attacker-controlled locations. This issue has been patched in version 20.36.1.

PUBLISHED Reserved 2026-01-08 | Published 2026-01-10 | Updated 2026-01-12 | Assigner GitHub_M




MEDIUM: 4.5CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L

Problem types

CWE-59: Improper Link Resolution Before File Access ('Link Following')

CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Product status

< 20.36.1
affected

References

github.com/...ualenv/security/advisories/GHSA-597g-3phw-6986

github.com/pypa/virtualenv/pull/3013

github.com/...ommit/dec4cec5d16edaf83a00a658f32d1e032661cebc

cve.org (CVE-2026-22702)

nvd.nist.gov (CVE-2026-22702)

Download JSON