Metrics
Affected Vendors & Products
Fri, 26 Sep 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the Python-Future 1.0.0 module allows for arbitrary code execution via the unintended import of a file named test.py. When the module is loaded, it automatically imports test.py, if present in the same directory or in the sys.path. This behavior can be exploited by an attacker who has the ability to write files to the server, allowing the execution of arbitrary code. | A vulnerability in the Python-Future 1.0.0 module allows for arbitrary code execution via the unintended import of a file named test.py. When the module is loaded, it automatically imports test.py, if present in the same directory or in the sys.path. This behavior can be exploited by an attacker who has the ability to write files to the server, allowing the execution of arbitrary code. NOTE: Multiple third parties have disputed this issue and stated that it is not a security flaw in python-future and is a documented feature of Python’s import system in the handling of sys.path. |
| References |
|
Sat, 16 Aug 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Python
Python python |
|
| Vendors & Products |
Python
Python python |
Fri, 15 Aug 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 | |
| Metrics |
cvssV3_1
|
ssvc
|
Fri, 15 Aug 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | pypi-future: Python future unintended import | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 14 Aug 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the Python-Future 1.0.0 module allows for arbitrary code execution via the unintended import of a file named test.py. When the module is loaded, it automatically imports test.py, if present in the same directory or in the sys.path. This behavior can be exploited by an attacker who has the ability to write files to the server, allowing the execution of arbitrary code. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-08-14T00:00:00.000Z
Updated: 2025-09-26T19:50:47.749Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-50817
Updated: 2025-08-15T16:36:58.332Z
Status : Awaiting Analysis
Published: 2025-08-14T17:15:40.947
Modified: 2025-09-26T20:15:36.313
Link: CVE-2025-50817