Vulnerability DatabaseGHSA-486g-47cc-8wxf

GHSA-486g-47cc-8wxf
Python vulnerability analysis and mitigation

Overview

The aiocpa package, a Python library for generating color gradients of text, was found to contain malicious code in versions 0.1.13 and 0.1.14. The vulnerability was discovered on November 21, 2024, and was assigned identifier GHSA-486g-47cc-8wxf. The malicious code was introduced in version 0.1.13 and persisted through version 0.1.14, after which all versions were removed from PyPI (PyPI Blog, GitHub Advisory).

Technical details

The vulnerability involved highly obfuscated code that was automatically executed when the module was imported. The malicious code was wrapped in 50 layers of obfuscation, using techniques like byte-encoding, compression, and reversals. When executed, it would override the constructor for the main client class and forward client credentials to a configured Telegram bot endpoint. The vulnerability has a CVSS v4 base score of 8.3 (High severity), with local attack vector, low attack complexity, and high impact on both confidentiality and integrity (PyPI Blog, GitHub Advisory).

Impact

The malware targeted Crypto Pay users by harvesting and exfiltrating sensitive credentials including tokens, API servers, and other Crypto Pay-related data to a remote Telegram bot. The potential impact includes unauthorized access to crypto wallets and possible financial losses, though the extent of actual exploitation is unknown (PyPI Blog).

Mitigation and workarounds

All versions of aiocpa have been removed from PyPI. Users who have installed any version of aiocpa should immediately audit their usage of the library and consider alternatives. It is recommended to implement additional protections such as outbound network firewalls to monitor or prevent network calls to unknown destinations. Users should also consider pinning their dependencies and versions, and use hashes to prevent unwanted updates to existing package/version constraints (PyPI Blog).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22612HIGH8.9
  • PythonPython
  • fickling
NoYesJan 10, 2026
CVE-2026-22609HIGH8.9
  • PythonPython
  • fickling
NoYesJan 10, 2026
CVE-2026-22608HIGH8.9
  • PythonPython
  • fickling
NoYesJan 10, 2026
CVE-2026-22691LOW2.7
  • PythonPython
  • pypdf
NoYesJan 10, 2026
CVE-2026-22690LOW2.7
  • PythonPython
  • pypdf
NoYesJan 10, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management