MAL-2025-47811

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/vcdiff-py/MAL-2025-47811.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2025-47811
Published
2025-08-21T15:31:47Z
Modified
2026-03-19T12:57:56.737001Z
Summary
Malicious code in vcdiff-py (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (d15d16ed1fc3a2984f207f6b4cf5fbea00fc66ecbf61a57faee650730aaf5c9d)

Installing the package or importing the module exfiltrates basic information about the host, and the package has no other purpose.


Category: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities.

Campaign: GENERIC-standard-pypi-install-pentest

Reasons (based on the campaign):

  • The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.

  • The package overrides the install command in setup.py to execute malicious code during installation.

Database specific
{
    "malicious-packages-origins": [
        {
            "source": "reversing-labs",
            "id": "RLMA-2025-04821",
            "modified_time": "2025-09-26T09:14:45Z",
            "sha256": "c25064bd810eff9dbee5053aa59fc9d23dbb528fc62d22af7edd06b2acd46440",
            "versions": [
                "2.2.0"
            ],
            "import_time": "2025-09-26T11:05:36.728933098Z"
        },
        {
            "source": "kam193",
            "id": "pypi/GENERIC-standard-pypi-install-pentest/vcdiff-py",
            "modified_time": "2025-08-21T15:31:47.97793Z",
            "sha256": "3b86ebc1dd7012cae098cb59e747b3eb206294fa6e82bd0600c7d77ea5a99b7d",
            "versions": [
                "2.2.0",
                "2.1.0"
            ],
            "import_time": "2025-12-02T22:30:56.488095036Z"
        },
        {
            "source": "kam193",
            "id": "pypi/GENERIC-standard-pypi-install-pentest/vcdiff-py",
            "modified_time": "2025-08-21T15:31:47.97793Z",
            "sha256": "d15d16ed1fc3a2984f207f6b4cf5fbea00fc66ecbf61a57faee650730aaf5c9d",
            "versions": [
                "2.2.0",
                "2.1.0"
            ],
            "import_time": "2025-12-02T23:07:19.669249427Z"
        },
        {
            "source": "kam193",
            "id": "pypi/GENERIC-standard-pypi-install-pentest/vcdiff-py",
            "modified_time": "2025-08-21T15:31:47.97793Z",
            "sha256": "0f10fa335a609974b19cdbbf889af8dfc2f06759d86435436e851f528bad917c",
            "versions": [
                "2.1.0",
                "2.2.0"
            ],
            "import_time": "2025-12-30T22:39:04.364634009Z"
        },
        {
            "source": "reversing-labs",
            "id": "RLUA-2026-00884",
            "modified_time": "2026-03-18T12:20:07Z",
            "sha256": "e7b40be4b4cab3bd0ae81f32060e4839030904a58bcc66e2428b90cc95d18730",
            "import_time": "2026-03-19T12:20:39.939629371Z"
        }
    ]
}
References
Credits

Affected packages

PyPI / vcdiff-py

Package

Affected ranges

Affected versions

2.*
2.1.0
2.2.0

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/vcdiff-py/MAL-2025-47811.json"