MAL-2026-603

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/mcp-pdftool-plus/MAL-2026-603.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-603
Published
2026-01-29T13:25:53Z
Modified
2026-01-29T14:05:18.571855Z
Summary
Malicious code in mcp-pdftool-plus (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (2e92dea8be02288f271dacad2cd77f1bdd54596da1691cb738c4a7b7b4f77d21)

When using the library, the hidden code starts a reverse shell


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2026-01-mcp-pdftool-plus

Reasons (based on the campaign):

  • The package contains code to create a reverse shell, allowing an attacker to execute any commands on the victim's machine.

  • action-hidden-in-lib-usage

Database specific
{
    "malicious-packages-origins": [
        {
            "versions": [
                "0.1.3",
                "0.1.4",
                "0.1.5"
            ],
            "source": "kam193",
            "import_time": "2026-01-29T13:54:02.659481693Z",
            "modified_time": "2026-01-29T13:25:53.059357Z",
            "id": "pypi/2026-01-mcp-pdftool-plus/mcp-pdftool-plus",
            "sha256": "2e92dea8be02288f271dacad2cd77f1bdd54596da1691cb738c4a7b7b4f77d21"
        }
    ],
    "iocs": {
        "ips": [
            "150.158.37.61"
        ]
    }
}
References
Credits

Affected packages

PyPI / mcp-pdftool-plus

Package

Name
mcp-pdftool-plus
View open source insights on deps.dev
Purl
pkg:pypi/mcp-pdftool-plus

Affected ranges

Affected versions

0.*
0.1.3
0.1.4
0.1.5

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/mcp-pdftool-plus/MAL-2026-603.json"