CVE-2022-30882
Python vulnerability analysis and mitigation

Overview

The pyanxdns package version 0.2 in PyPI was identified with a code execution backdoor vulnerability (CVE-2022-30882). The vulnerability was discovered in May 2022 and allows remote arbitrary code execution when installing the affected version. The issue stems from the package containing a malicious dependency called 'request' (without 's'), which differs from the legitimate 'requests' Python module (BleepingComputer).

Technical details

The vulnerability exists in version 0.2 of the pyanxdns package and received a CVSS v3.1 base score of 9.8 (CRITICAL) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The issue occurs during package installation when the malicious 'request' dependency is automatically installed alongside the main package (NVD).

Impact

When exploited, the vulnerability allows attackers to execute arbitrary code remotely on the affected system. The malicious 'request' package contains a backdoor that can steal cookies and personal information from web browsers including Chrome, Firefox, Yandex, and Brave. Additionally, it attempts to steal login credentials stored in web browsers, which could lead to further supply-chain attacks (BleepingComputer).

Mitigation and workarounds

The recommended mitigation is to avoid using version 0.2 of the pyanxdns package. The package maintainer has since uploaded a new version and deleted the vulnerable version from PyPI. Users should ensure they are using the latest version of the package and verify their dependencies are sourcing from trusted repositories (BleepingComputer).

Community reactions

The package maintainer, Marky Egebäck, confirmed that the inclusion of the malicious dependency was due to a typographical error in the setup.py file rather than an account compromise. The issue was discovered by GitHub user duxinglin1, who reported it through the project's issue tracker (BleepingComputer).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67511CRITICAL9.6
  • PythonPython
  • cai-framework
NoNoDec 11, 2025
CVE-2025-13780CRITICAL9.1
  • PythonPython
  • pgadmin4
NoYesDec 11, 2025
CVE-2025-67644HIGH7.3
  • PythonPython
  • langgraph-checkpoint-sqlite
NoYesDec 11, 2025
CVE-2025-67720MEDIUM6.5
  • PythonPython
  • pyrofork
NoYesDec 11, 2025
CVE-2025-67485MEDIUM5.3
  • PythonPython
  • mad-proxy
NoNoDec 10, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management