MAL-2025-192349

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/qt-main/MAL-2025-192349.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2025-192349
Published
2025-12-05T22:52:28Z
Modified
2025-12-05T23:47:32.972926Z
Summary
Malicious code in qt-main (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (bd1f92a69928dc8fa2a6a50cfd596c34802bc68fc28dd5dd8508fc24344bbec9)

Installing the package or importing the module exfiltrates basic information about the host, and the package has no other purpose.


Category: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities.

Campaign: GENERIC-standard-pypi-install-pentest

Reasons (based on the campaign):

  • The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.

  • The package overrides the install command in setup.py to execute malicious code during installation.

Database specific
{
    "malicious-packages-origins": [
        {
            "sha256": "bd1f92a69928dc8fa2a6a50cfd596c34802bc68fc28dd5dd8508fc24344bbec9",
            "id": "pypi/GENERIC-standard-pypi-install-pentest/qt-main",
            "import_time": "2025-12-05T23:35:55.30642573Z",
            "versions": [
                "5.15.2",
                "0.0.0"
            ],
            "modified_time": "2025-12-05T22:52:28.275138Z",
            "source": "kam193"
        }
    ]
}
References
Credits

Affected packages

PyPI / qt-main

Package

Affected ranges

Affected versions

0.*

0.0.0

5.*

5.15.2