CVE-2026-5271
pymanager included the current working directory in sys.path meaning modules could be shadowed by modules in the current working directory. As a result, if a user executes a pymanager-generated command (e.g., pip, pytest)
from an attacker-controlled directory, a malicious module in that
directory can be imported and executed instead of the intended package.
from an attacker-controlled directory, a malicious module in that
directory can be imported and executed instead of the intended package.
Vendor
-
Product
-
CWE
Yayın Tarihi
2026-04-01 14:16:59
Güncelleme
2026-04-02 00:16:24
Source Identifier
cna@python.org
KEV Date Added
-