-
Notifications
You must be signed in to change notification settings - Fork 122
Description
Vulnerable Library - pytest-8.4.2-py3-none-any.whl
pytest: simple powerful testing with Python
Library home page: https://files.pythonhosted.org/packages/a8/a4/20da314d277121d6534b3a980b29035dcd51e6744bd79075a6ce8fa4eb8d/pytest-8.4.2-py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /tmp/ws-ua_20260201145705_NPZVSP/python_KLBTOE/202602011457051/env/lib/python3.9/site-packages/pytest-8.4.2.dist-info
Mend has checked all newer package trees, and you are on the least vulnerable package!
Please note: There might be a version that explicitly solves one or more of the vulnerabilities listed below, but we do not recommend it. For more info about the optional fixes, check the "Details" section below.
Vulnerabilities
| Vulnerability | Severity | Exploit Maturity | EPSS | Dependency | Type | Fixed in (pytest version) | Fix PR available | Reachability | |
|---|---|---|---|---|---|---|---|---|---|
| CVE-2025-71176 | 6.8 | Not Defined | 0.0% | pytest-8.4.2-py3-none-any.whl | Direct | N/A | ❌ |
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2025-71176
Vulnerable Library - pytest-8.4.2-py3-none-any.whl
pytest: simple powerful testing with Python
Library home page: https://files.pythonhosted.org/packages/a8/a4/20da314d277121d6534b3a980b29035dcd51e6744bd79075a6ce8fa4eb8d/pytest-8.4.2-py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /tmp/ws-ua_20260201145705_NPZVSP/python_KLBTOE/202602011457051/env/lib/python3.9/site-packages/pytest-8.4.2.dist-info
Dependency Hierarchy:
- ❌ pytest-8.4.2-py3-none-any.whl (Vulnerable Library)
Found in base branch: main
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
pytest through 9.0.2 on UNIX relies on directories with the /tmp/pytest-of-{user} name pattern, which allows local users to cause a denial of service or possibly gain privileges.
Publish Date: 2026-01-22
URL: CVE-2025-71176
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.0%
CVSS 3 Score Details (6.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low