MAL-2026-745

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/statssol/MAL-2026-745.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-745
Published
2026-02-04T19:47:20Z
Modified
2026-02-04T20:21:18.241999Z
Summary
Malicious code in statssol (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (578ffe3c11af717c95f71893133a46e8e418742109d414583b3ccc5044fa3a99)

On importing the module, a remote code is executed. At the moment of analysis, the remote URL did not return any valid script, presumably as the package was already quite old


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2026-02-old-statssol

Reasons (based on the campaign):

  • Downloads and executes a remote malicious script.
Database specific
{
    "malicious-packages-origins": [
        {
            "id": "pypi/2026-02-old-statssol/statssol",
            "import_time": "2026-02-04T20:13:36.349198809Z",
            "modified_time": "2026-02-04T19:47:20.172951Z",
            "sha256": "578ffe3c11af717c95f71893133a46e8e418742109d414583b3ccc5044fa3a99",
            "source": "kam193",
            "versions": [
                "0.6.0",
                "0.7.0"
            ]
        }
    ],
    "iocs": {
        "urls": [
            "http://gg.gg/test_does_nothing"
        ]
    }
}
References
Credits

Affected packages

PyPI / statssol

Package

Affected ranges

Affected versions

0.*
0.6.0
0.7.0

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/statssol/MAL-2026-745.json"