MAL-2025-1003

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/w722-poc/MAL-2025-1003.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2025-1003
Published
2024-07-26T16:53:30Z
Modified
2025-12-12T20:43:54.718064Z
Summary
Malicious code in w722-poc (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (74cbe1029791e4751e8b8c53fda75aa07cd3a6ca974a239c87867db522c2ee8e)

Installing the package or importing the module exfiltrates basic information about the host, and the package has no other purpose.


Category: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities.

Campaign: GENERIC-standard-pypi-install-pentest

Reasons (based on the campaign):

  • The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.

  • The package overrides the install command in setup.py to execute malicious code during installation.

Database specific
{
    "malicious-packages-origins": [
        {
            "source": "reversing-labs",
            "id": "RLMA-2025-00544",
            "import_time": "2025-02-03T18:38:10.306497669Z",
            "sha256": "1936f12dd2812906f4b0200782b0169cd01e9a54ec0d3e3a551e162763580512",
            "versions": [
                "0.1"
            ],
            "modified_time": "2025-02-03T17:08:03Z"
        },
        {
            "source": "kam193",
            "import_time": "2025-12-02T22:30:56.496541915Z",
            "ranges": [
                {
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ],
                    "type": "ECOSYSTEM"
                }
            ],
            "sha256": "012dd3d349184489402a60cf280c95f9d43915c503409807671c911e463134b7",
            "id": "pypi/GENERIC-standard-pypi-install-pentest/w722-poc",
            "modified_time": "2024-07-26T16:53:30Z"
        },
        {
            "source": "kam193",
            "import_time": "2025-12-02T23:07:19.679490632Z",
            "ranges": [
                {
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ],
                    "type": "ECOSYSTEM"
                }
            ],
            "sha256": "74cbe1029791e4751e8b8c53fda75aa07cd3a6ca974a239c87867db522c2ee8e",
            "id": "pypi/GENERIC-standard-pypi-install-pentest/w722-poc",
            "modified_time": "2024-07-26T16:53:30Z"
        },
        {
            "source": "kam193",
            "id": "pypi/GENERIC-standard-pypi-install-pentest/w722-poc",
            "import_time": "2025-12-10T21:38:58.773903208Z",
            "sha256": "60a849d151dd0d27cc4cde83cbeefe2511656f990b8ad61062aecf3a3d45921c",
            "versions": [
                "0.1"
            ],
            "modified_time": "2024-07-26T16:53:30Z"
        }
    ]
}
References
Credits

Affected packages

PyPI / w722-poc

Package

Affected ranges

Affected versions

0.*

0.1