
Cloud Vulnerability DB
A community-led vulnerabilities database
The exotel project on PyPI was compromised through a user account phishing attack in August 2022. The attackers published a malicious version 0.1.6 of the package that contained harmful code designed to steal environment variables and execute malware during installation (GitHub Advisory, PyPA Advisory).
The compromised version 0.1.6 of the exotel package was designed to collect environment variables and download and execute malware during the package installation process. The vulnerability has been assigned a high severity rating (GitHub Advisory).
When installed, the malicious package version 0.1.6 could steal sensitive environment variables and execute malware on the target system, potentially leading to system compromise and data theft (GitHub Advisory).
Users should immediately remove version 0.1.6 of the exotel package if installed. No patched versions have been released, and users should exercise caution when installing any version of this package (GitHub Advisory).
PyPI officially acknowledged the security incident through their Twitter account, alerting users about the compromise (PyPI Tweet).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."