Wiz Agents & Workflows are here

CVE-2018-20225
CBL Mariner vulnerability analysis and mitigation

Overview

A vulnerability was discovered in pip (all versions) where it installs the version with the highest version number when using the --extra-index-url option, even if the user intended to obtain a private package from a private index. The vulnerability (CVE-2018-20225) affects cases where the package does not already exist in the public index, allowing an attacker to put the package there with an arbitrary version number (NIST NVD, Cowlicks Blog).

Technical details

The vulnerability occurs specifically when --extra-index-url is used to point to a private PyPI server that has packages with names that are not claimed on the public PyPI. When this happens, pip needs to choose which PyPI to take the package from and simply selects the one with the higher version number. This becomes exploitable when someone is using a private PyPI with the --extra-index-url option and they are using a package on the private PyPI with a name they have not claimed on the public PyPI (Cowlicks Blog).

Impact

An attacker could potentially execute arbitrary code by taking control of an unclaimed package name on the public PyPI and replacing it with a malicious payload. The attacker could gain control of the public package name if it wasn't taken, or even if it was taken but unused (according to PEP 541). This particularly affects organizations using private Python packages that haven't claimed their package names on the public PyPI (Cowlicks Blog).

Mitigation and workarounds

Red Hat recommends using --index-url and not using --extra-index-url, OR explicitly setting --index-url when using --extra-index-url. The Python security team recommends using version-pinning and hash-pinning for deployments to avoid this issue. Another mitigation strategy is to claim and maintain ownership of private package names on the public PyPI (Red Hat Bugzilla, Cowlicks Blog).

Community reactions

Red Hat Product Security does not consider this to be a security vulnerability because per the pip documentation, this is intended behavior of pip when using the --extra-index-url flag. The issue was marked as WONTFIX. The Python security team acknowledged the issue but stated there was no path to fix it at the time. The vulnerability gained renewed attention in 2021 when it was rediscovered and received significant press coverage (Red Hat Bugzilla).

Additional resources


SourceThis report was generated using AI

Related CBL Mariner vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-27135HIGH7.5
  • NixOSNixOS
  • nodejs24
NoYesMar 18, 2026
CVE-2026-4111HIGH7.5
  • Rocky LinuxRocky Linux
  • libarchive
NoYesMar 13, 2026
CVE-2026-32775HIGH7.4
  • CBL MarinerCBL Mariner
  • libexif-devel
NoYesMar 16, 2026
CVE-2026-27459HIGH7.2
  • PythonPython
  • rust-asn1+std-devel
NoYesMar 18, 2026
CVE-2026-27448LOW1.7
  • PythonPython
  • airflow-3
NoYesMar 18, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management