{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T22:57:43.004","vulnerabilities":[{"cve":{"id":"CVE-2026-22702","sourceIdentifier":"security-advisories@github.com","published":"2026-01-10T07:16:02.857","lastModified":"2026-02-18T17:43:08.147","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"virtualenv is a tool for creating isolated virtual python environments. Prior to version 20.36.1, TOCTOU (Time-of-Check-Time-of-Use) vulnerabilities in virtualenv allow local attackers to perform symlink-based attacks on directory creation operations. An attacker with local access can exploit a race condition between directory existence checks and creation to redirect virtualenv's app_data and lock file operations to attacker-controlled locations. This issue has been patched in version 20.36.1."},{"lang":"es","value":"virtualenv es una herramienta para crear entornos virtuales de Python aislados. Antes de la versión 20.36.1, las vulnerabilidades TOCTOU (Time-of-Check-Time-of-Use) en virtualenv permiten a atacantes locales realizar ataques basados en enlaces simbólicos en operaciones de creación de directorios. Un atacante con acceso local puede explotar una condición de carrera entre las comprobaciones de existencia de directorios y su creación para redirigir las operaciones de los archivos app_data y de bloqueo de virtualenv a ubicaciones controladas por el atacante. Este problema ha sido parcheado en la versión 20.36.1."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L","baseScore":4.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":1.0,"impactScore":3.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-59"},{"lang":"en","value":"CWE-362"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:virtualenv:virtualenv:*:*:*:*:*:*:*:*","versionEndExcluding":"20.36.1","matchCriteriaId":"1339346E-BA67-4C3F-8792-7F1829C91FA2"}]}]}],"references":[{"url":"https://github.com/pypa/virtualenv/commit/dec4cec5d16edaf83a00a658f32d1e032661cebc","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/pypa/virtualenv/pull/3013","source":"security-advisories@github.com","tags":["Issue Tracking","Patch"]},{"url":"https://github.com/pypa/virtualenv/security/advisories/GHSA-597g-3phw-6986","source":"security-advisories@github.com","tags":["Mitigation","Patch","Vendor Advisory"]}]}}]}