CVE-2026-5271

HIGH

Possible to hijack modules in current working directory

Title source: cna
STIX 2.1

Description

pymanager included the current working directory in sys.path meaning modules could be shadowed by modules in the current working directory. As a result, if a user executes a pymanager-generated command (e.g., pip, pytest) from an attacker-controlled directory, a malicious module in that directory can be imported and executed instead of the intended package.

Scores

CVSS v3 7.8
EPSS 0.0001
EPSS Percentile 2.4%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-427
Status published
Products (2)
python/pymanager 26.0
Python Software Foundation/pymanager 26.0 - 26.1
Published Apr 01, 2026
Tracked Since Apr 01, 2026