CVE-2026-5271
HIGHPossible to hijack modules in current working directory
Title source: cnaDescription
pymanager included the current working directory in sys.path meaning modules could be shadowed by modules in the current working directory. As a result, if a user executes a pymanager-generated command (e.g., pip, pytest) from an attacker-controlled directory, a malicious module in that directory can be imported and executed instead of the intended package.
Scores
CVSS v3
7.8
EPSS
0.0001
EPSS Percentile
2.4%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-427
Status
published
Products (2)
python/pymanager
26.0
Python Software Foundation/pymanager
26.0 - 26.1
Published
Apr 01, 2026
Tracked Since
Apr 01, 2026