Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-13327

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-27 Feb, 2026 | 07:30
Updated At-27 Feb, 2026 | 07:30
Rejected At-
Credits

Uv: uv: specially crafted zip archives lead to arbitrary code execution due to parsing differentials

A flaw was found in uv. This vulnerability allows an attacker to execute malicious code during package resolution or installation via specially crafted ZIP (Zipped Information Package) archives that exploit parsing differentials, requiring user interaction to install an attacker-controlled package.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:27 Feb, 2026 | 07:30
Updated At:27 Feb, 2026 | 07:30
Rejected At:
▼CVE Numbering Authority (CNA)
Uv: uv: specially crafted zip archives lead to arbitrary code execution due to parsing differentials

A flaw was found in uv. This vulnerability allows an attacker to execute malicious code during package resolution or installation via specially crafted ZIP (Zipped Information Package) archives that exploit parsing differentials, requiring user interaction to install an attacker-controlled package.

Affected Products
Vendor
astral-sh
Product
uv
Collection URL
https://github.com/astral-sh/uv
Package Name
uv
Default Status
unaffected
Versions
Affected
  • From 0 before 0.9.6 (semver)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat AI Inference Server
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhai/base-image-cpu-rhel9
CPEs
  • cpe:/a:redhat:ai_inference_server:3
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat AI Inference Server
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhai/base-image-cuda-rhel9
CPEs
  • cpe:/a:redhat:ai_inference_server:3
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat AI Inference Server
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhai/base-image-rocm-rhel9
CPEs
  • cpe:/a:redhat:ai_inference_server:3
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat AI Inference Server
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhaiis/model-opt-cuda-rhel9
CPEs
  • cpe:/a:redhat:ai_inference_server:3
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat AI Inference Server
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhaiis-preview/vllm-cuda-rhel9
CPEs
  • cpe:/a:redhat:ai_inference_server:3
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat AI Inference Server
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhaiis/vllm-cuda-rhel9
CPEs
  • cpe:/a:redhat:ai_inference_server:3
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat AI Inference Server
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhaiis/vllm-rocm-rhel9
CPEs
  • cpe:/a:redhat:ai_inference_server:3
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift AI (RHOAI)
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhoai/odh-pipeline-runtime-datascience-cpu-py312-rhel9
CPEs
  • cpe:/a:redhat:openshift_ai
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift AI (RHOAI)
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhoai/odh-pipeline-runtime-minimal-cpu-py312-rhel9
CPEs
  • cpe:/a:redhat:openshift_ai
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift AI (RHOAI)
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhoai/odh-pipeline-runtime-pytorch-cuda-py312-rhel9
CPEs
  • cpe:/a:redhat:openshift_ai
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift AI (RHOAI)
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhoai/odh-pipeline-runtime-pytorch-llmcompressor-cuda-py312-rhel9
CPEs
  • cpe:/a:redhat:openshift_ai
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift AI (RHOAI)
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhoai/odh-pipeline-runtime-pytorch-rocm-py312-rhel9
CPEs
  • cpe:/a:redhat:openshift_ai
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift AI (RHOAI)
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhoai/odh-pipeline-runtime-tensorflow-cuda-py312-rhel9
CPEs
  • cpe:/a:redhat:openshift_ai
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift AI (RHOAI)
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhoai/odh-pipeline-runtime-tensorflow-rocm-py312-rhel9
CPEs
  • cpe:/a:redhat:openshift_ai
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift AI (RHOAI)
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhoai/odh-training-rocm64-torch28-py312-rhel9
CPEs
  • cpe:/a:redhat:openshift_ai
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift AI (RHOAI)
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhoai/odh-vllm-cpu-rhel9
CPEs
  • cpe:/a:redhat:openshift_ai
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift AI (RHOAI)
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhoai/odh-workbench-codeserver-datascience-cpu-py312-rhel9
CPEs
  • cpe:/a:redhat:openshift_ai
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift AI (RHOAI)
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhoai/odh-workbench-jupyter-datascience-cpu-py312-rhel9
CPEs
  • cpe:/a:redhat:openshift_ai
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift AI (RHOAI)
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhoai/odh-workbench-jupyter-minimal-cpu-py312-rhel9
CPEs
  • cpe:/a:redhat:openshift_ai
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift AI (RHOAI)
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhoai/odh-workbench-jupyter-minimal-cuda-py312-rhel9
CPEs
  • cpe:/a:redhat:openshift_ai
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift AI (RHOAI)
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhoai/odh-workbench-jupyter-minimal-rocm-py312-rhel9
CPEs
  • cpe:/a:redhat:openshift_ai
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift AI (RHOAI)
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhoai/odh-workbench-jupyter-pytorch-cuda-py312-rhel9
CPEs
  • cpe:/a:redhat:openshift_ai
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift AI (RHOAI)
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhoai/odh-workbench-jupyter-pytorch-llmcompressor-cuda-py312-rhel9
CPEs
  • cpe:/a:redhat:openshift_ai
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift AI (RHOAI)
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhoai/odh-workbench-jupyter-pytorch-rocm-py312-rhel9
CPEs
  • cpe:/a:redhat:openshift_ai
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift AI (RHOAI)
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhoai/odh-workbench-jupyter-tensorflow-cuda-py312-rhel9
CPEs
  • cpe:/a:redhat:openshift_ai
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift AI (RHOAI)
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhoai/odh-workbench-jupyter-tensorflow-rocm-py312-rhel9
CPEs
  • cpe:/a:redhat:openshift_ai
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift AI (RHOAI)
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rhoai/odh-workbench-jupyter-trustyai-cpu-py312-rhel9
CPEs
  • cpe:/a:redhat:openshift_ai
Default Status
affected
Problem Types
TypeCWE IDDescription
CWECWE-1286Improper Validation of Syntactic Correctness of Input
Type: CWE
CWE ID: CWE-1286
Description: Improper Validation of Syntactic Correctness of Input
Metrics
VersionBase scoreBase severityVector
3.16.3MEDIUM
CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Metrics Other Info
Red Hat severity rating
value:
Moderate
namespace:
https://access.redhat.com/security/updates/classification/
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Exploits

Credits

Timeline
EventDate
Reported to Red Hat.2025-10-29 23:05:44
Made public.2025-10-29 22:12:57
Event: Reported to Red Hat.
Date: 2025-10-29 23:05:44
Event: Made public.
Date: 2025-10-29 22:12:57
Replaced By

Rejected Reason

References
HyperlinkResource
https://access.redhat.com/security/cve/CVE-2025-13327
vdb-entry
x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2407263
issue-tracking
x_refsource_REDHAT
https://github.com/astral-sh/uv
N/A
https://github.com/astral-sh/uv/commit/da659fee4898a73dbc75070f3e82d49f745e4628
N/A
https://github.com/astral-sh/uv/security/advisories/GHSA-pqhf-p39g-3x64
N/A
Hyperlink: https://access.redhat.com/security/cve/CVE-2025-13327
Resource:
vdb-entry
x_refsource_REDHAT
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2407263
Resource:
issue-tracking
x_refsource_REDHAT
Hyperlink: https://github.com/astral-sh/uv
Resource: N/A
Hyperlink: https://github.com/astral-sh/uv/commit/da659fee4898a73dbc75070f3e82d49f745e4628
Resource: N/A
Hyperlink: https://github.com/astral-sh/uv/security/advisories/GHSA-pqhf-p39g-3x64
Resource: N/A
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:27 Feb, 2026 | 08:17
Updated At:27 Feb, 2026 | 14:06

A flaw was found in uv. This vulnerability allows an attacker to execute malicious code during package resolution or installation via specially crafted ZIP (Zipped Information Package) archives that exploit parsing differentials, requiring user interaction to install an attacker-controlled package.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.3MEDIUM
CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-1286Primarysecalert@redhat.com
CWE ID: CWE-1286
Type: Primary
Source: secalert@redhat.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://access.redhat.com/security/cve/CVE-2025-13327secalert@redhat.com
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=2407263secalert@redhat.com
N/A
https://github.com/astral-sh/uvsecalert@redhat.com
N/A
https://github.com/astral-sh/uv/commit/da659fee4898a73dbc75070f3e82d49f745e4628secalert@redhat.com
N/A
https://github.com/astral-sh/uv/security/advisories/GHSA-pqhf-p39g-3x64secalert@redhat.com
N/A
Hyperlink: https://access.redhat.com/security/cve/CVE-2025-13327
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2407263
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://github.com/astral-sh/uv
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://github.com/astral-sh/uv/commit/da659fee4898a73dbc75070f3e82d49f745e4628
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://github.com/astral-sh/uv/security/advisories/GHSA-pqhf-p39g-3x64
Source: secalert@redhat.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

2Records found

CVE-2020-10737
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.11% / 30.14%
||
7 Day CHG~0.00%
Published-27 May, 2020 | 00:00
Updated-04 Aug, 2024 | 11:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition was found in the mkhomedir tool shipped with the oddjob package in versions before 0.34.5 and 0.34.6 wherein, during the home creation, mkhomedir copies the /etc/skel directory into the newly created home and changes its ownership to the home's user without properly checking the homedir path. This flaw allows an attacker to leverage this issue by creating a symlink point to a target folder, which then has its ownership transferred to the new home directory's unprivileged user.

Action-Not Available
Vendor-Red Hat, Inc.
Product-oddjoboddjob
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2025-13033
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.03% / 7.29%
||
7 Day CHG~0.00%
Published-14 Nov, 2025 | 19:37
Updated-03 Feb, 2026 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Nodemailer: nodemailer: email to an unintended domain can occur due to interpretation conflict

A vulnerability was identified in the email parsing library due to improper handling of specially formatted recipient email addresses. An attacker can exploit this flaw by crafting a recipient address that embeds an external address within quotes. This causes the application to misdirect the email to the attacker's external address instead of the intended internal recipient. This could lead to a significant data leak of sensitive information and allow an attacker to bypass security filters and access controls.

Action-Not Available
Vendor-nodemailerRed Hat, Inc.
Product-nodemailerRed Hat Advanced Cluster Management for Kubernetes 2Red Hat Developer HubRed Hat Ceph Storage 8
CWE ID-CWE-1286
Improper Validation of Syntactic Correctness of Input
Details not found