| Name | CVE-2026-1703 |
| Description | When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| python-pip (PTS) | bullseye | 20.3.4-4+deb11u1 | vulnerable |
| bullseye (security) | 20.3.4-4+deb11u2 | vulnerable | |
| bookworm | 23.0.1+dfsg-1 | vulnerable | |
| trixie | 25.1.1+dfsg-1 | vulnerable | |
| forky, sid | 25.3+dfsg-1 | vulnerable |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| python-pip | source | (unstable) | (unfixed) |
https://github.com/pypa/pip/pull/13777
Fixed by: https://github.com/pypa/pip/commit/4c651b70d60ed91b13663bcda9b3ed41748d0124 (26.0)
https://mail.python.org/archives/list/security-announce@python.org/thread/WIEA34D4TABF2UNQJAOMXKCICSPBE2DJ/
check as well pipenv