Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2025-47273
Summary
The package setuptools allows users to download, build, install, upgrade, and uninstall Python packages. A Path Traversal vulnerability in `PackageIndex` is present in setuptools versions prior to 78.1.1. An attacker would be allowed to write files to arbitrary locations on the filesystem with permissions of the process running the Python code, which could escalate to remote code execution depending on the context.
- LOW
- NETWORK
- HIGH
- UNCHANGED
- NONE
- LOW
- HIGH
- HIGH
CWE-22 - Path Traversal
Path traversal (or directory traversal), is a vulnerability that allows malicious users to traverse the server's root directory, gaining access to arbitrary files and folders such as application code & data, back-end credentials, and sensitive operating system files. In the worst-case scenario, an attacker could potentially execute arbitrary files on the server, resulting in a denial of service attack. Such an exploit may severely impact the integrity, confidentiality, and availability of an application.
References
Advisory Timeline
- Published