{"schema_version":"1.7.2","id":"OESA-2025-2558","modified":"2025-10-31T14:12:52Z","published":"2025-10-31T14:12:52Z","upstream":["CVE-2025-24359"],"summary":"python-asteval security update","details":"ASTEVAL provides a numpy-aware, safe(ish) &amp;apos;eval&amp;apos; function\r\n\r\nSecurity Fix(es):\n\nASTEVAL is an evaluator of Python expressions and statements. Prior to version 1.0.6, if an attacker can control the input to the `asteval` library, they can bypass asteval s restrictions and execute arbitrary Python code in the context of the application using the library. The vulnerability is rooted in how `asteval` performs handling of `FormattedValue` AST nodes. In particular, the `on_formattedvalue` value uses the dangerous format method of the str class. The code allows an attacker to manipulate the value of the string used in the dangerous call `fmt.format(__fstring__=val)`. This vulnerability can be exploited to access protected attributes by intentionally triggering an `AttributeError` exception. The attacker can then catch the exception and use its `obj` attribute to gain arbitrary access to sensitive or protected object properties. Version 1.0.6 fixes this issue.(CVE-2025-24359)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP4","name":"python-asteval","purl":"pkg:rpm/openEuler/python-asteval&distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.25-1.oe2203sp4"}]}],"ecosystem_specific":{"noarch":["python-asteval-help-0.9.25-1.oe2203sp4.noarch.rpm","python3-asteval-0.9.25-1.oe2203sp4.noarch.rpm"],"src":["python-asteval-0.9.25-1.oe2203sp4.src.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2558"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-24359"}],"database_specific":{"severity":"High"}}
