Pip Python Pip

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Python Pip.

By the Year

In 2026 there have been 1 vulnerability in Python Pip. Last year, in 2025 Pip had 1 security vulnerability published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Pip in 2026 could surpass last years number.




Year Vulnerabilities Average Score
2026 1 0.00
2025 1 0.00
2024 0 0.00
2023 1 5.50
2022 0 0.00
2021 1 5.70
2020 2 0.00

It may take a day or so for new Pip vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Python Pip Security Vulnerabilities

Python Pip Wheel Extraction Path Traversal (CVE-2026-1703)
CVE-2026-1703 - February 02, 2026

When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.

Directory traversal

pip TAR Extraction Vulnerability: Symbolic Links without PEP706
CVE-2025-8869 - September 24, 2025

When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a "fixed" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the "vulnerable" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.

Pip <23.3 Config Injection via Mercurial VCS URLs
CVE-2023-5752 5.5 - Medium - October 25, 2023

When installing a package from a Mercurial VCS URL (ie "pip install hg+...") with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the "hg clone" call (ie "--config"). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.

Command Injection

A flaw was found in python-pip in the way it handled Unicode separators in git references
CVE-2021-3572 5.7 - Medium - November 10, 2021

A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.

The pip package before 19.2 for Python
CVE-2019-20916 - September 04, 2020

The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.

An issue was discovered in pip (all versions)
CVE-2018-20225 - May 08, 2020

An issue was discovered in pip (all versions) because it installs the version with the highest version number, even if the user had intended to obtain a private package from a private index. This only affects use of the --extra-index-url option, and exploitation requires that the package does not already exist in the public index (and thus the attacker can put the package there with an arbitrary version number). NOTE: it has been reported that this is intended functionality and the user is responsible for using --extra-index-url securely

pip 1.3 through 1.5.6
CVE-2014-8991 - November 24, 2014

pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a /tmp/pip-build-* file for another user.

pip before 1.3 allows local users to overwrite arbitrary files
CVE-2013-1888 - August 17, 2013

pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.

insecure temporary file

pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which
CVE-2013-1629 - August 06, 2013

pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a "pip install" operation.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Python Pip or by Python? Click the Watch button to subscribe.

Python
Vendor

Python Pip
Product

subscribe