CVE-2025-32798
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-16

Last updated on: 2025-07-02

Assigner: GitHub, Inc.

Description
Conda-build contains commands and tools to build conda packages. Prior to version 25.4.0, the conda-build recipe processing logic has been found to be vulnerable to arbitrary code execution due to unsafe evaluation of recipe selectors. Currently, conda-build uses the eval function to process embedded selectors in meta.yaml files. This approach evaluates user-defined expressions without proper sanitization, which allows arbitrary code to be executed during the build process. As a result, the integrity of the build environment is compromised, and unauthorized commands or file operations may be performed. The vulnerability stems from the inherent risk of using eval() on untrusted input in a context intended to control dynamic build configurations. By directly interpreting selector expressions, conda-build creates a potential execution pathway for malicious code, violating security assumptions. This issue has been patched in version 25.4.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-16
Last Modified
2025-07-02
Generated
2026-05-07
AI Q&A
2025-06-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
anaconda conda-build to 25.4.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-32798 is a vulnerability in conda-build versions prior to 25.4.0 where the software uses Python's eval() function unsafely to process recipe selectors embedded in meta.yaml files. This unsafe evaluation allows attackers to execute arbitrary code during the build process by injecting malicious expressions. As a result, unauthorized commands or file operations can be performed, compromising the integrity of the build environment. [1]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to execute arbitrary code within your build environment when using conda-build versions ≀ 25.3.2. This can lead to unauthorized commands being run, files being modified or created without permission, and overall compromise of the build system's integrity, potentially affecting the security and reliability of your software builds. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by inspecting conda-build meta.yaml recipe files for unsafe or suspicious selector expressions that use Python's eval() function to execute arbitrary code. A proof-of-concept involves a malicious selector expression using __import__('os').system() to execute shell commands during the build process. To detect exploitation, you can check for unexpected files or commands executed during conda-build runs, such as the presence of files like /var/run/shm/poc.txt created by malicious selectors. There is no direct network detection command provided, but monitoring build logs for unusual commands or outputs during conda-build execution is recommended. Specific commands to check for suspicious files or processes might include: 1) `find /var/run/shm -name poc.txt` to detect the proof-of-concept file, 2) reviewing build logs for unexpected shell commands, and 3) scanning meta.yaml files for suspicious selector expressions containing calls to __import__ or os.system. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade conda-build to version 25.4.0 or later, where the vulnerability has been patched. The patch replaces the unsafe use of Python's eval() with a secure evaluation mechanism using the evalidate library, which restricts allowed operations and prevents arbitrary code execution. Additionally, avoid using untrusted or external meta.yaml recipe files until they are verified safe. Monitoring and restricting build environments to trusted sources and applying the patch will mitigate the risk. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart