CVE-2026-42301 PUBLISHED

Improper Input Validation leading to Improper Control of Generation of Code ('Code Injection') in pyp2spec

Assigner: GitHub_M
Reserved: 26.04.2026 Published: 09.05.2026 Updated: 09.05.2026

pyp2spec generates working Fedora RPM spec file for Python projects. Prior to version 0.14.1, pyp2spec was writing PyPI package metadata (e.g. the summary field) into the generated spec file without escaping RPM macro directives. When a packager then runs rpmbuild, those directives get evaluated, so a malicious package can execute arbitrary commands on the build machine. This issue has been patched in version 0.14.1.

Metrics

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS Score: 7.8

Product Status

Vendor befeleme
Product pyp2spec
Versions
  • Version < 0.14.1 is affected

References

Problem Types

  • CWE-20: Improper Input Validation CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE