{"id":"BIT-libpython-2022-26488","details":"In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.","aliases":["BIT-python-2022-26488","BIT-python-min-2022-26488","CVE-2022-26488"],"modified":"2025-08-11T14:45:01.865857Z","published":"2025-08-11T13:52:02.378Z","database_specific":{"severity":"High","cpes":["cpe:2.3:a:python:python:*:*:*:*:*:*:*:*"]},"references":[{"type":"WEB","url":"https://mail.python.org/archives/list/security-announce%40python.org/thread/657Z4XULWZNIY5FRP3OWXHYKUSIH6DMN/"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-26488"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20220419-0005/"}],"affected":[{"package":{"name":"libpython","ecosystem":"Bitnami","purl":"pkg:bitnami/libpython"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"3.7.13"},{"introduced":"3.10.0"},{"fixed":"3.10.3"},{"introduced":"3.8.0"},{"fixed":"3.8.13"},{"introduced":"3.9.0"},{"fixed":"3.9.11"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/libpython/BIT-libpython-2022-26488.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}],"schema_version":"1.7.3"}