HIGH SeverityCVSS 3.17.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2026-42301
Last updated May 09, 2026 · Published May 09, 2026
Description
pyp2spec generates working Fedora RPM spec file for Python projects. Prior to version 0.14.1, pyp2spec was writing PyPI package metadata (e.g. the summary field) into the generated spec file without escaping RPM macro directives. When a packager then runs rpmbuild, those directives get evaluated, so a malicious package can execute arbitrary commands on the build machine. This issue has been patched in version 0.14.1.
Affected products
1 listed- befeleme:pyp2spec
Mappings
CWE
CWE-20CWE-94
CAPEC
None listed.
Related
Research
Training
- Input Validation and Schema EnforcementValidate early, validate strictly - schemas, allowlists, and type-safe boundaries.
- Injection TodaySQL, NoSQL, ORM, and LLM injection - what's changed and what hasn't.
- Dependency and Supply Chain ManagementSBOMs, lock files, and surviving the next big supply chain attack.
CVE® content © MITRE Corporation. Licensed under the CVE Terms of Use. Terms
