{"id":"CVE-2022-26488","details":"In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.","aliases":["BIT-libpython-2022-26488","BIT-python-2022-26488","BIT-python-min-2022-26488"],"modified":"2026-04-11T12:42:35.312305Z","published":"2022-03-10T17:47:45.383Z","database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","extracted_events":[{"last_affected":"3.11.0-alpha1"}],"cpe":"cpe:2.3:a:python:python:3.11.0:alpha1:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"3.11.0-alpha2"}],"cpe":"cpe:2.3:a:python:python:3.11.0:alpha2:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"3.11.0-alpha3"}],"cpe":"cpe:2.3:a:python:python:3.11.0:alpha3:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"3.11.0-alpha4"}],"cpe":"cpe:2.3:a:python:python:3.11.0:alpha4:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"3.11.0-alpha5"}],"cpe":"cpe:2.3:a:python:python:3.11.0:alpha5:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"3.11.0-alpha6"}],"cpe":"cpe:2.3:a:python:python:3.11.0:alpha6:*:*:*:*:*:*"}]},"references":[{"type":"WEB","url":"https://mail.python.org/archives/list/security-announce%40python.org/thread/657Z4XULWZNIY5FRP3OWXHYKUSIH6DMN/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20220419-0005/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/python/cpython","events":[{"introduced":"0"},{"last_affected":"1f97973f630fda109039b2a8c8024a70eb92932f"},{"introduced":"fa919fdf2583bdfead1df00e842f24f30b2a34bf"},{"last_affected":"07119dd38c9a6e5da84ca8a0a46acdf8a3e60ecf"},{"introduced":"9cf6752276e6fcfd0c23fdb064ad27f448aaaf75"},{"last_affected":"f2f3f537829ab0ef6948be5ee7f46b8ce8213ff2"},{"introduced":"b494f5935c92951e75597bfe1c8b1f3112fec270"},{"last_affected":"a58ebcc701dd6c43630df941481475ff0f615a81"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"3.7.12"},{"introduced":"3.8.0"},{"last_affected":"3.8.12"},{"introduced":"3.9.0"},{"last_affected":"3.9.10"},{"introduced":"3.10.0"},{"last_affected":"3.10.2"}],"cpe":"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*"}}],"versions":["v0.9.8","v0.9.9","v1.0.1","v1.0.2","v1.1","v1.1.1","v1.2","v1.2b1","v1.2b2","v1.2b3","v1.2b4","v1.3","v1.3b1","v1.4","v1.4b1","v1.4b2","v1.4b3","v1.5","v1.5.1","v1.5.2","v1.5.2a1","v1.5.2a2","v1.5.2b1","v1.5.2b2","v1.5.2c1","v1.5a1","v1.5a2","v1.5a3","v1.5a4","v1.5b1","v1.5b2","v1.6a1","v1.6a2","v2.0","v2.0b1","v2.0b2","v2.0c1","v2.1","v2.1a1","v2.1a2","v2.1b1","v2.1b2","v2.1c1","v2.1c2","v2.2a3","v2.3c1","v2.3c2","v2.4","v2.4a1","v2.4a2","v2.4a3","v2.4b1","v2.4b2","v2.4c1","v3.0a1","v3.0a2","v3.0a3","v3.0a4","v3.0a5","v3.0b1","v3.0b2","v3.0b3","v3.0rc1","v3.0rc2","v3.0rc3","v3.1","v3.10.0a1","v3.10.0a7","v3.10.0b1","v3.10.0b2","v3.10.0b3","v3.10.0b4","v3.10.0rc1","v3.10.0rc2","v3.10.1","v3.10.2","v3.1a1","v3.1a2","v3.1b1","v3.1rc1","v3.1rc2","v3.2a1","v3.2a2","v3.2a3","v3.2a4","v3.2b1","v3.2b2","v3.2rc1","v3.2rc2","v3.2rc3","v3.3.0a2","v3.3.0a3","v3.3.0a4","v3.3.0b1","v3.3.0b2","v3.3.0rc1","v3.3.0rc2","v3.3.0rc3","v3.4.0a1","v3.4.0a2","v3.4.0a3","v3.4.0a4","v3.4.0b1","v3.4.0b2","v3.4.0b3","v3.5.0a1","v3.5.0a2","v3.5.0a3","v3.5.0a4","v3.5.0b1","v3.6.0a3","v3.6.0b1","v3.7.0a2","v3.7.0b1","v3.7.0b2","v3.7.0b3","v3.7.0b4","v3.7.0b5","v3.7.0rc1","v3.7.10","v3.7.11","v3.7.12","v3.7.2rc1","v3.7.3rc1","v3.7.6rc1","v3.7.7rc1","v3.7.8","v3.7.8rc1","v3.7.9","v3.8.0rc1","v3.8.11","v3.8.12","v3.8.3","v3.8.3rc1","v3.8.5","v3.8.8","v3.8.8rc1","v3.9.0a2","v3.9.0b1","v3.9.0b3","v3.9.0b5","v3.9.10","v3.9.2","v3.9.2rc1","v3.9.5","v3.9.6","v3.9.7","v3.9.8","v3.9.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-26488.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}