Plataforma SaaS de monitoreo y actualización automática de dependencias Python con enfoque en seguridad y remediación de vulnerabilidades.
Scouted 6 hours ago
Turn this signal into an edge
We help you build it, validate it, and get there first.
Go from idea to plan: who buys, what MVP to launch, how to validate it, and what to measure before spending months.
Extra context
Learn more about this idea
Get a clearer explanation of what the opportunity means, the current problem behind it, how this idea solves it, and the key concepts involved.
Score breakdown
Existencia de vulnerabilidades en versiones comunes de pip que afectan la seguridad de proyectos Python.
Equipos de desarrollo de software, empresas que gestionan proyectos Python, y departamentos de seguridad informática.
"pip-25.0.1-py3-none-any.whl: 4 vulnerabilities (highest severity is: 7.8)"
pip-25.0.1-py3-none-any.whl: 4 vulnerabilities (highest severity is: 7.8)
Published: 6 hours ago
Repository: snowdensb/ClickHouse Author: mend-for-github-com[bot] <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>pip-25.0.1-py3-none-any.whl</b></summary> <p>The PyPA recommended tool for installing Python packages.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/c9/bc/b7db44f5f39f9d0494071bddae6880eb645970366d0a200022a1a93d57f5/pip-25.0.1-py3-none-any.whl">https://files.pythonhosted.org/packages/c9/bc/b7db44f5f39f9d0494071bddae6880eb645970366d0a200022a1a93d57f5/pip-25.0.1-py3-none-any.whl</a></p> <p>Path to dependency file: /docker/test/integration/base/requirements.txt</p> <p>Path to vulnerable library: /tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/20260128181755/pip-25.0.1-py3-none-any.whl,/tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/202601281825221/env/lib/python3.9/site-packages/pip-25.0.1.dist-info,/tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/20260128181755/pip-25.0.1-py3-none-any.whl,/tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/20260128181755/65/pip-25.0.1-py3-none-any.whl,/tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/20260128181755/142/pip-25.0.1-py3-none-any.whl</p> <p> <p>Found in HEAD commit: <a href="https://github.com/snowdensb/ClickHouse/commit/fbf23d54294bf12741ba65cf95c4c4e68e3216bd">fbf23d54294bf12741ba65cf95c4c4e68e3216bd</a></p></details> ## Vulnerabilities | Vulnerability | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (pip version) | Remediation Possible** | Reachability | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | --- | | [CVE-2018-20225](https://www.mend.io/vulnerability-database/CVE-2018-20225) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.8 | pip-25.0.1-py3-none-any.whl | Direct | N/A | ❌| | | [CVE-2025-8869](https://www.mend.io/vulnerability-database/CVE-2025-8869) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 6.5 | pip-25.0.1-py3-none-any.whl | Direct | 25.2 | ✅| | | [CVE-2026-1703](https://www.mend.io/vulnerability-database/CVE-2026-1703) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low | 3.5 | pip-25.0.1-py3-none-any.whl | Direct | https://github.com/pypa/pip.git - 26.0,pip - 26.0 | ✅| | | [CVE-2026-3219](https://www.mend.io/vulnerability-database/CVE-2026-3219) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low | 3.3 | pip-25.0.1-py3-none-any.whl | Direct | N/A | ❌| | <p>**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation</p> ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2018-20225</summary> ### Vulnerable Library - <b>pip-25.0.1-py3-none-any.whl</b> <p>The PyPA recommended tool for installing Python packages.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/c9/bc/b7db44f5f39f9d0494071bddae6880eb645970366d0a200022a1a93d57f5/pip-25.0.1-py3-none-any.whl">https://files.pythonhosted.org/packages/c9/bc/b7db44f5f39f9d0494071bddae6880eb645970366d0a200022a1a93d57f5/pip-25.0.1-py3-none-any.whl</a></p> <p>Path to dependency file: /docker/test/integration/base/requirements.txt</p> <p>Path to vulnerable library: /tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/20260128181755/pip-25.0.1-py3-none-any.whl,/tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/202601281825221/env/lib/python3.9/site-packages/pip-25.0.1.dist-info,/tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/20260128181755/pip-25.0.1-py3-none-any.whl,/tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/20260128181755/65/pip-25.0.1-py3-none-any.whl,/tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/20260128181755/142/pip-25.0.1-py3-none-any.whl</p> <p> Dependency Hierarchy: - :x: **pip-25.0.1-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/snowdensb/ClickHouse/commit/fbf23d54294bf12741ba65cf95c4c4e68e3216bd">fbf23d54294bf12741ba65cf95c4c4e68e3216bd</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> An issue was discovered in pip (all versions) because it installs the version with the highest version number, even if the user had intended to obtain a private package from a private index. This only affects use of the --extra-index-url option, and exploitation requires that the package does not already exist in the public index (and thus the attacker can put the package there with an arbitrary version number). NOTE: it has been reported that this is intended functionality and the user is responsible for using --extra-index-url securely Mend Note: The description of this vulnerability differs from MITRE. <p>Publish Date: 2020-05-08 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-20225>CVE-2018-20225</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2025-8869</summary> ### Vulnerable Library - <b>pip-25.0.1-py3-none-any.whl</b> <p>The PyPA recommended tool for installing Python packages.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/c9/bc/b7db44f5f39f9d0494071bddae6880eb645970366d0a200022a1a93d57f5/pip-25.0.1-py3-none-any.whl">https://files.pythonhosted.org/packages/c9/bc/b7db44f5f39f9d0494071bddae6880eb645970366d0a200022a1a93d57f5/pip-25.0.1-py3-none-any.whl</a></p> <p>Path to dependency file: /docker/test/integration/base/requirements.txt</p> <p>Path to vulnerable library: /tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/20260128181755/pip-25.0.1-py3-none-any.whl,/tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/202601281825221/env/lib/python3.9/site-packages/pip-25.0.1.dist-info,/tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/20260128181755/pip-25.0.1-py3-none-any.whl,/tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/20260128181755/65/pip-25.0.1-py3-none-any.whl,/tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/20260128181755/142/pip-25.0.1-py3-none-any.whl</p> <p> Dependency Hierarchy: - :x: **pip-25.0.1-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/snowdensb/ClickHouse/commit/fbf23d54294bf12741ba65cf95c4c4e68e3216bd">fbf23d54294bf12741ba65cf95c4c4e68e3216bd</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a "fixed" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the "vulnerable" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice. <p>Publish Date: 2025-09-24 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2025-8869>CVE-2025-8869</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-4xh5-x5gv-qwph">https://github.com/advisories/GHSA-4xh5-x5gv-qwph</a></p> <p>Release Date: 2025-09-24</p> <p>Fix Resolution: 25.2</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation will be attempted for this issue. </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> CVE-2026-1703</summary> ### Vulnerable Library - <b>pip-25.0.1-py3-none-any.whl</b> <p>The PyPA recommended tool for installing Python packages.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/c9/bc/b7db44f5f39f9d0494071bddae6880eb645970366d0a200022a1a93d57f5/pip-25.0.1-py3-none-any.whl">https://files.pythonhosted.org/packages/c9/bc/b7db44f5f39f9d0494071bddae6880eb645970366d0a200022a1a93d57f5/pip-25.0.1-py3-none-any.whl</a></p> <p>Path to dependency file: /docker/test/integration/base/requirements.txt</p> <p>Path to vulnerable library: /tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/20260128181755/pip-25.0.1-py3-none-any.whl,/tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/202601281825221/env/lib/python3.9/site-packages/pip-25.0.1.dist-info,/tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/20260128181755/pip-25.0.1-py3-none-any.whl,/tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/20260128181755/65/pip-25.0.1-py3-none-any.whl,/tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/20260128181755/142/pip-25.0.1-py3-none-any.whl</p> <p> Dependency Hierarchy: - :x: **pip-25.0.1-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/snowdensb/ClickHouse/commit/fbf23d54294bf12741ba65cf95c4c4e68e3216bd">fbf23d54294bf12741ba65cf95c4c4e68e3216bd</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations. <p>Publish Date: 2026-02-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2026-1703>CVE-2026-1703</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>3.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2026-02-02</p> <p>Fix Resolution: https://github.com/pypa/pip.git - 26.0,pip - 26.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation will be attempted for this issue. </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> CVE-2026-3219</summary> ### Vulnerable Library - <b>pip-25.0.1-py3-none-any.whl</b> <p>The PyPA recommended tool for installing Python packages.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/c9/bc/b7db44f5f39f9d0494071bddae6880eb645970366d0a200022a1a93d57f5/pip-25.0.1-py3-none-any.whl">https://files.pythonhosted.org/packages/c9/bc/b7db44f5f39f9d0494071bddae6880eb645970366d0a200022a1a93d57f5/pip-25.0.1-py3-none-any.whl</a></p> <p>Path to dependency file: /docker/test/integration/base/requirements.txt</p> <p>Path to vulnerable library: /tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/20260128181755/pip-25.0.1-py3-none-any.whl,/tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/202601281825221/env/lib/python3.9/site-packages/pip-25.0.1.dist-info,/tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/20260128181755/pip-25.0.1-py3-none-any.whl,/tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/20260128181755/65/pip-25.0.1-py3-none-any.whl,/tmp/ws-ua_20260128181754_HFKZMN/python_OXXGAV/20260128181755/142/pip-25.0.1-py3-none-any.whl</p> <p> Dependency Hierarchy: - :x: **pip-25.0.1-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/snowdensb/ClickHouse/commit/fbf23d54294bf12741ba65cf95c4c4e68e3216bd">fbf23d54294bf12741ba65cf95c4c4e68e3216bd</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> pip handles concatenated tar and ZIP files as ZIP files regardless of filename or whether a file is both a tar and ZIP file. This behavior could result in confusing installation behavior, such as installing "incorrect" files according to the filename of the archive. New behavior only proceeds with installation if the file identifies uniquely as a ZIP or tar archive, not as both. <p>Publish Date: 2026-04-20 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2026-3219>CVE-2026-3219</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>3.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> </details> *** <p>:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.</p>