Home

Description

pyp2spec generates working Fedora RPM spec file for Python projects. Prior to version 0.14.1, pyp2spec was writing PyPI package metadata (e.g. the summary field) into the generated spec file without escaping RPM macro directives. When a packager then runs rpmbuild, those directives get evaluated, so a malicious package can execute arbitrary commands on the build machine. This issue has been patched in version 0.14.1.

PUBLISHED Reserved 2026-04-26 | Published 2026-05-09 | Updated 2026-05-09 | Assigner GitHub_M




HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-20: Improper Input Validation

CWE-94: Improper Control of Generation of Code ('Code Injection')

Product status

< 0.14.1
affected

References

github.com/...p2spec/security/advisories/GHSA-r35x-v8p8-xvhw

github.com/befeleme/pyp2spec/releases/tag/v0.14.1

cve.org (CVE-2026-42301)

nvd.nist.gov (CVE-2026-42301)

Download JSON