CVE-2026-3219
pip doesn't reject concatenated ZIP and tar archives
Description
pip handles concatenated tar and ZIP files as ZIP files regardless of filename or whether a file is both a tar and ZIP file. This behavior could result in confusing installation behavior, such as installing "incorrect" files according to the filename of the archive. New behavior only proceeds with installation if the file identifies uniquely as a ZIP or tar archive, not as both.
INFO
Published Date :
April 20, 2026, 4:16 p.m.
Last Modified :
April 20, 2026, 9:16 p.m.
Remotely Exploit :
No
Source :
[email protected]
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 4.0 | MEDIUM | 28c92f92-d60d-412d-b760-e73465c3df22 | ||||
| CVSS 4.0 | MEDIUM | [email protected] |
Solution
- Update pip to the latest version.
- Verify archive handling behavior.
- Ensure unique archive identification.
- Test installations with mixed archives.
Public PoC/Exploit Available at Github
CVE-2026-3219 has a 11 public
PoC/Exploit available at Github.
Go to the Public Exploits tab to see the list.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2026-3219.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2026-3219 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2026-3219
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Semi-physical NODI nanochannel interferometric simulator for nanoparticle and EV detection design, parameter sweeps, dashboard analysis, and paper-aligned validation.
Python Batchfile Shell
None
Shell Dockerfile Python Rust JavaScript HTML TypeScript CSS
LLM 기반 에이전트 협업 구조를 활용한 반복 개선형 일정 생성 시스템
Dockerfile Python
None
Python Dockerfile
None
Dockerfile Python JavaScript HTML CSS
None
Makefile Dockerfile Python JavaScript HTML TypeScript CSS Shell
None
Python Dockerfile Shell CSS JavaScript HTML Procfile
Real-time USD exchange rates from official central bank sources — Python library, REST API, and AWS Lambda deployment with DynamoDB caching.
banks currency-exchange-rates exchange-rates forex fx aws-lambda beautifulsoup central-bank currency python rapidapi rest-api web-scraping
Python Dockerfile Makefile
Run synthetic focus groups and user research panels using AI personas. CLI tool, Python library, any LLM.
llm-evaluation mcp persona-simulation python survey-research synthetic-respondents
Python Shell HTML Dockerfile Jinja
Modular, secure, and scalable Python stack for robust development - Security guards, Result types, Retry logic, Circuit breakers, and more.
python python3 stack devops toolkit utils api
Python Makefile PowerShell Shell Dockerfile
Make AI agents and AI workflows measurably reliable. Epistemic measurement, Noetic RAG, Sentinel gating, and grounded calibration for Claude Code and beyond
ai-agents ai-workflows ai-memory ai-os epistemic-ai anti-confabulation
Makefile Python Shell Dockerfile PowerShell Ruby
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2026-3219 vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2026-3219 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Apr. 20, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/04/20/8 -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Apr. 20, 2026
Action Type Old Value New Value Added CWE CWE-434 -
New CVE Received by [email protected]
Apr. 20, 2026
Action Type Old Value New Value Added Description pip handles concatenated tar and ZIP files as ZIP files regardless of filename or whether a file is both a tar and ZIP file. This behavior could result in confusing installation behavior, such as installing "incorrect" files according to the filename of the archive. New behavior only proceeds with installation if the file identifies uniquely as a ZIP or tar archive, not as both. Added CVSS V4.0 AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Added Reference https://github.com/pypa/pip/pull/13870 Added Reference https://mail.python.org/archives/list/[email protected]/thread/QAJ5JIVWWCAJ4EZL2FP5MOOW35JS7LRJ/