Python Setuptools vulnerabilities
4 known vulnerabilities affecting python/setuptools.
Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH2MEDIUM2
Vulnerabilities
Page 1 of 1
CVE-2025-47273HIGHCVSS 7.7fixed in 78.1.12025-05-17
CVE-2025-47273 [HIGH] CWE-22 CVE-2025-47273: setuptools is a package that allows users to download, build, install, upgrade, and uninstall Python
setuptools is a package that allows users to download, build, install, upgrade, and uninstall Python packages. A path traversal vulnerability in `PackageIndex` is present in setuptools prior to version 78.1.1. An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code
ghsanvdosv
CVE-2024-6345HIGHCVSS 8.8≥ 0, < 70.0.02024-07-15
CVE-2024-6345 [HIGH] CWE-94 setuptools vulnerable to Command Injection via package URL
setuptools vulnerable to Command Injection via package URL
A vulnerability in the `package_index` module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlle
ghsaosv
CVE-2022-40897MEDIUMCVSS 5.9fixed in 65.5.12022-12-23
CVE-2022-40897 [MEDIUM] CWE-1333 CVE-2022-40897: Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial
Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py.
ghsanvdosv
CVE-2013-1633MEDIUMCVSS 6.8≤ 0.7b4v0.6.40+9 more2013-08-06
CVE-2013-1633 [MEDIUM] CWE-20 CVE-2013-1633: easy_install in setuptools before 0.7 uses HTTP to retrieve packages from the PyPI repository, and d
easy_install in setuptools before 0.7 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to the default use of the product.
ghsanvdosv