| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-r35x-v8p8-xvhw | pyp2spec is Vulnerable to Code Injection |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 11 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 10 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Befeleme
Befeleme pyp2spec |
|
| Vendors & Products |
Befeleme
Befeleme pyp2spec |
Sat, 09 May 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pyp2spec generates working Fedora RPM spec file for Python projects. Prior to version 0.14.1, pyp2spec was writing PyPI package metadata (e.g. the summary field) into the generated spec file without escaping RPM macro directives. When a packager then runs rpmbuild, those directives get evaluated, so a malicious package can execute arbitrary commands on the build machine. This issue has been patched in version 0.14.1. | |
| Title | Improper Input Validation leading to Improper Control of Generation of Code ('Code Injection') in pyp2spec | |
| Weaknesses | CWE-20 CWE-94 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-11T17:34:43.929Z
Reserved: 2026-04-26T12:13:55.552Z
Link: CVE-2026-42301
Updated: 2026-05-11T17:34:30.548Z
Status : Deferred
Published: 2026-05-09T04:16:25.923
Modified: 2026-05-13T16:49:32.233
Link: CVE-2026-42301
No data.
OpenCVE Enrichment
Updated: 2026-05-10T21:24:35Z
Github GHSA