A flaw was found in uv. This vulnerability allows an attacker to execute malicious code during package resolution or installation via specially crafted ZIP (Zipped Information Package) archives that exploit parsing differentials, requiring user interaction to install an attacker-controlled package.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2025-13327 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2407263 | Issue Tracking |
| https://github.com/astral-sh/uv | Product |
| https://github.com/astral-sh/uv/commit/da659fee4898a73dbc75070f3e82d49f745e4628 | Patch |
| https://github.com/astral-sh/uv/security/advisories/GHSA-pqhf-p39g-3x64 | Vendor Advisory |
Configurations
History
17 Mar 2026, 21:06
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Astral uv
Astral |
|
| CWE | NVD-CWE-noinfo | |
| CPE | cpe:2.3:a:astral:uv:*:*:*:*:*:python:*:* | |
| Summary |
|
|
| References | () https://access.redhat.com/security/cve/CVE-2025-13327 - Third Party Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2407263 - Issue Tracking | |
| References | () https://github.com/astral-sh/uv - Product | |
| References | () https://github.com/astral-sh/uv/commit/da659fee4898a73dbc75070f3e82d49f745e4628 - Patch | |
| References | () https://github.com/astral-sh/uv/security/advisories/GHSA-pqhf-p39g-3x64 - Vendor Advisory |
27 Feb 2026, 08:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-27 08:17
Updated : 2026-03-17 21:06
NVD link : CVE-2025-13327
Mitre link : CVE-2025-13327
CVE.ORG link : CVE-2025-13327
JSON object : View
Products Affected
astral
- uv
CWE
