PT-2026-3917 · Pypi+1 · Wheel+1
Kilkat
·
Published
2026-01-22
·
Updated
2026-03-06
·
CVE-2026-24049
CVSS v3.1
7.1
7.1
High
| Base vector | Vector | AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
wheel versions 0.40.0 through 0.46.1
Description
The 'wheel' package, a tool for manipulating Python wheel files, contains a flaw in the
unpack function. This flaw allows for file permission modification through mishandling of file permissions after extraction. The logic incorrectly trusts the filename from the archive header when setting file permissions, even after the extraction process has sanitized the path. An attacker can craft a malicious wheel file that, when unpacked, alters the permissions of critical system files, potentially enabling Privilege Escalation or arbitrary code execution. The vulnerability is triggered when the unpack function applies permissions based on the unsanitized filename from the archive header. This can lead to critical system files becoming world-writable.Recommendations
Update to a version of wheel greater than 0.46.1.
Exploit
Fix
LPE
Path traversal
Incorrect Permission
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
ALSA-2026:1902
ALSA-2026:1939
ALSA-2026:2090
CVE-2026-24049
ECHO-3D34-CEC5-CF72
GHSA-8RRH-RW8J-W5FX
OESA-2026-1279
OESA-2026-1280
OESA-2026-1281
RHSA-2026:1902
RHSA-2026:1939
RHSA-2026:2090
RHSA-2026:2710
RHSA-2026:2823
RHSA-2026:2865
RHSA-2026:2866
RHSA-2026:3958
RHSA-2026:3959
Affected Products
Rocky Linux
Wheel
References · 49
- 🔥 https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/24xxx/CVE-2026-24049.json⭐ 2435 🔗 553 · Exploit
- https://github.com/pypa/wheel/security/advisories/GHSA-8rrh-rw8j-w5fx⭐ 549 🔗 177 · Vendor Advisory
- https://github.com/pypa/wheel/commit/7a7d2de96b22a9adf9208afcc9547e1001569fef⭐ 549 🔗 177 · Patch
- https://osv.dev/vulnerability/OESA-2026-1279 · Vendor Advisory
- https://errata.rockylinux.org/RLSA-2026:1939 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-24049 · Security Note
- https://ubuntu.com/security/CVE-2026-24049 · Vendor Advisory
- https://errata.rockylinux.org/RLSA-2026:2090 · Vendor Advisory
- https://cve.org/CVERecord?id=CVE-2026-24049 · Security Note
- https://osv.dev/vulnerability/CVE-2026-24049 · Vendor Advisory
- https://security-tracker.debian.org/tracker/CVE-2026-24049 · Vendor Advisory
- https://errata.almalinux.org/9/ALSA-2026-1939.html · Vendor Advisory
- https://linux.oracle.com/errata/ELSA-2026-1939.html · Vendor Advisory
- https://osv.dev/vulnerability/DEBIAN-CVE-2026-24049 · Vendor Advisory
- https://osv.dev/vulnerability/ALSA-2026:2090 · Vendor Advisory