PT-2026-29526 · Pymanager · Pymanager
Lakshmikanthan K
+1
·
Published
2026-04-01
·
Updated
2026-04-01
·
CVE-2026-5271
CVSS v4.0
5.6
Medium
| AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
Name of the Vulnerable Software and Affected Versions
pymanager (affected versions not specified)
Description
pymanager included the current working directory in its
sys.path, allowing modules in the current working directory to shadow intended packages. If a user runs a pymanager-generated command (like pip or pytest) from a directory controlled by an attacker, a malicious module in that directory could be imported and executed instead of the legitimate package.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
Uncontrolled Search Path Element
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Pymanager