Sunday, June 1, 2025
HomeCVE/vulnerabilityOver 43 Million Python Installations Vulnerable to Dangerous Code Execution Flaw

Over 43 Million Python Installations Vulnerable to Dangerous Code Execution Flaw

Published on

SIEM as a Service

Follow Us on Google News

A significant vulnerability has been uncovered in the Python JSON Logger package (python-json-logger), affecting versions 3.2.0 and 3.2.1.

This flaw, CVE-2025-27607 allows for remote code execution (RCE) due to misusing a missing dependency known as msgspec-python313-pre.

The issue gained widespread attention due to a recent experiment demonstrating how malicious actors could exploit this vulnerability by claiming and manipulating the missing dependency.

- Advertisement - Google News

Details of the Vulnerability

The problem arose when the msgspec-python313-pre dependency was deleted from PyPi.

This deletion left the dependency name available for anyone to claim, potentially allowing malicious actors to publish a package with the same name.

If a malicious actor were to claim the dependency, users who installed the development dependencies of python-json-logger using pip install python-json-logger[dev] on Python 3.13 could unknowingly download and execute malicious code.

The vulnerability was discovered during research on supply chain attacks by @omnigodz. The researcher identified that while the dependency was not present in PyPi, it was still declared in the pyproject.toml file of python-json-logger version 3.2.1.

Affected Versions

  • 3.2.0
  • 3.2.1

To demonstrate the vulnerability without causing harm, the researcher temporarily published a non-malicious package under the same name and then deleted it.

This action prevented potential malicious actors from exploiting the vulnerability by ensuring the package name is now associated with a trusted entity.

Impact and Response

The python-json-logger package is widely used, with over 46 million monthly downloads, according to the official PyPi BigQuery database.

Although there is no evidence that the vulnerability was exploited before its public disclosure, the potential impact is significant.

Any user installing the development dependencies of python-json-logger could have been at risk if a malicious actor had claimed the msgspec-python313-pre dependency.

To address this issue, the maintainers of python-json-logger have released version 3.3.0, which no longer includes the vulnerable dependency.

Users of affected versions are advised to update to the latest version as soon as possible to mitigate the risk of RCE attacks.

This incident highlights the importance of maintaining and securing dependencies in software packages.

It also underscores the need for vigilance in supply chain security within open-source ecosystems.

While this particular vulnerability has been addressed, it serves as a reminder for developers and users alike to stay informed about potential security risks and to keep their software up-to-date.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments

A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra...

Threat Actors Exploit Google Apps Script to Host Phishing Sites

The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages...

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated...

Beware: Weaponized AI Tool Installers Infect Devices with Ransomware

Cisco Talos has uncovered a series of malicious threats masquerading as legitimate AI tool...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments

A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra...

Threat Actors Exploit Google Apps Script to Host Phishing Sites

The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages...

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated...