Bug 2432090

Summary: CVE-2026-24049 python3.13-setuptools: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking [epel-9]
Product: [Fedora] Fedora EPEL Reporter: Jon Moroney <jmoroney>
Component: python3.13-setuptoolsAssignee: Python Maintainers <python-maint>
Status: CLOSED NOTABUG QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: epel9CC: ksurma, mhroncok, python-maint, python-packagers-sig
Target Milestone: ---Keywords: Security, SecurityTracking
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard: {"flaws": ["68c36e5e-ac35-42b4-ba4e-ef0edd5b3f06"]}
Fixed In Version: Doc Type: ---
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2026-02-25 14:00:16 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2431959    

Description Jon Moroney 2026-01-22 18:09:22 UTC
Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

Comment 1 Miro HronĨok 2026-01-23 11:39:39 UTC
The code indeed exists in setuptools. In setuptools-78.1.1/setuptools/_vendor/wheel/cli/unpack.py

We will be checking whether this code is used by setuptools or not.

Comment 2 Karolina Surma 2026-02-25 14:00:16 UTC
Based on Lumir Balhar's investigation made for this version of setuptools here: https://bugzilla.redhat.com/show_bug.cgi?id=2432108: 

The vulnerable wheel.cli.unpack.unpack() function is only used by the wheel CLI tool. Setuptools never imports or calls this function - I verified there are no references to wheel.cli.unpack anywhere in setuptools code outside the vendored wheel package itself.
Setuptools uses its own implementation for unpacking zip archives, and that implementation properly sanitizes target paths, so the same exploit is not possible here.