Vulnerability DatabaseGHSA-jxr6-qrxx-2ph2

GHSA-jxr6-qrxx-2ph2
Python vulnerability analysis and mitigation

Overview

The num2words Python package was compromised through a phishing attack in July 2025, resulting in the publication of two malicious versions (0.5.15 and 0.5.16) to PyPI. The compromised versions were published without corresponding tags in the official GitHub repository, which raised initial suspicions. The affected versions were quickly identified and removed from PyPI to prevent further installations (GitHub Advisory, StepSecurity Blog).

Technical details

The vulnerability is classified as CWE-506 (Embedded Malicious Code) with a Critical severity rating of 9.3 CVSS score. The malicious code was injected into the setup.py file of the compromised versions, which would execute during package installation. The attack vector is classified as Network-based with Low attack complexity, requiring No privileges and No user interaction for exploitation (GitHub Advisory).

Impact

The compromise potentially affects all systems that installed num2words versions 0.5.15 or 0.5.16. The malicious package could execute during installation, potentially leading to theft of sensitive information from the environment. The package's widespread use and automated dependency management tools attempting to upgrade to the compromised version increased the potential impact radius (StepSecurity Blog).

Mitigation and workarounds

Users are advised to immediately check their environments for the compromised versions (0.5.15 and 0.5.16) and remove them if present. The recommended action is to downgrade to version 0.5.14 using the command 'pip install num2words==0.5.14'. Organizations should also audit their systems that may have installed the compromised versions (StepSecurity Blog).

Community reactions

The security community responded quickly to the incident, with security researcher @johnk3r raising early warnings on social media. PyPI administrators took swift action by removing the compromised package to prevent further installations. The incident has heightened awareness about supply chain security in the Python ecosystem (StepSecurity Blog).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23949HIGH8.6
  • PythonPython
  • jaraco.context
NoYesJan 20, 2026
CVE-2026-22219HIGH8.3
  • PythonPython
  • chainlit
NoYesJan 20, 2026
CVE-2026-23842HIGH7.5
  • PythonPython
  • chatterbot
NoYesJan 19, 2026
CVE-2026-23877MEDIUM5.3
  • PythonPython
  • swingmusic
NoYesJan 19, 2026
CVE-2026-23833LOW1.7
  • PythonPython
  • esphome
NoYesJan 19, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management