CVE-2025-13327

A flaw was found in uv. This vulnerability allows an attacker to execute malicious code during package resolution or installation via specially crafted ZIP (Zipped Information Package) archives that exploit parsing differentials, requiring user interaction to install an attacker-controlled package.
Configurations

Configuration 1 (hide)

cpe:2.3:a:astral:uv:*:*:*:*:*:python:*:*

History

17 Mar 2026, 21:06

Type Values Removed Values Added
First Time Astral uv
Astral
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:astral:uv:*:*:*:*:*:python:*:*
Summary
  • (es) Se encontró una falla en uv. Esta vulnerabilidad permite a un atacante ejecutar código malicioso durante la resolución o instalación de paquetes a través de archivos ZIP (Paquete de Información Comprimida) especialmente manipulados que explotan diferenciales de análisis, requiriendo interacción del usuario para instalar un paquete controlado por el atacante.
References () https://access.redhat.com/security/cve/CVE-2025-13327 - () https://access.redhat.com/security/cve/CVE-2025-13327 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2407263 - () https://bugzilla.redhat.com/show_bug.cgi?id=2407263 - Issue Tracking
References () https://github.com/astral-sh/uv - () https://github.com/astral-sh/uv - Product
References () https://github.com/astral-sh/uv/commit/da659fee4898a73dbc75070f3e82d49f745e4628 - () https://github.com/astral-sh/uv/commit/da659fee4898a73dbc75070f3e82d49f745e4628 - Patch
References () https://github.com/astral-sh/uv/security/advisories/GHSA-pqhf-p39g-3x64 - () https://github.com/astral-sh/uv/security/advisories/GHSA-pqhf-p39g-3x64 - Vendor Advisory

27 Feb 2026, 08:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-27 08:17

Updated : 2026-03-17 21:06


NVD link : CVE-2025-13327

Mitre link : CVE-2025-13327

CVE.ORG link : CVE-2025-13327


JSON object : View

Products Affected

astral

  • uv
CWE
CWE-1286

Improper Validation of Syntactic Correctness of Input

NVD-CWE-noinfo