GHSA-JXR6-QRXX-2PH2
Vulnerability from github – Published: 2025-07-31 19:33 – Updated: 2025-07-31 19:33
VLAI?
Summary
num2words subjected to phishing attack, two versions published containing malware
Details
The num2words project was compromised via a phishing attack and two new versions were uploaded to PyPI containing malicious code. The affected versions have been removed from PyPI, and users are advised to remove the affected versions from their environments.
Severity ?
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "num2words"
},
"ranges": [
{
"events": [
{
"introduced": "0.5.15"
},
{
"last_affected": "0.5.16"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [
"CWE-506"
],
"github_reviewed": true,
"github_reviewed_at": "2025-07-31T19:33:29Z",
"nvd_published_at": null,
"severity": "CRITICAL"
},
"details": "The `num2words` project was compromised via a phishing attack and two new versions were uploaded to PyPI containing malicious code. The affected versions have been removed from PyPI, and users are advised to remove the affected versions from their environments.",
"id": "GHSA-jxr6-qrxx-2ph2",
"modified": "2025-07-31T19:33:29Z",
"published": "2025-07-31T19:33:29Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/pypa/advisory-database/tree/main/vulns/num2words/PYSEC-2025-72.yaml"
},
{
"type": "PACKAGE",
"url": "https://github.com/savoirfairelinux/num2words"
},
{
"type": "WEB",
"url": "https://nitter.tiekoetter.com/SFLinux/status/1949906299308953827"
},
{
"type": "WEB",
"url": "https://www.stepsecurity.io/blog/supply-chain-security-alert-num2words-pypi-package-shows-signs-of-compromise"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "num2words subjected to phishing attack, two versions published containing malware"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…