{"id":"OESA-2025-2558","summary":"python-asteval security update","details":"ASTEVAL provides a numpy-aware, safe(ish) &amp;apos;eval&amp;apos; function\r\n\r\nSecurity Fix(es):\n\nASTEVAL is an evaluator of Python expressions and statements. Prior to version 1.0.6, if an attacker can control the input to the `asteval` library, they can bypass asteval s restrictions and execute arbitrary Python code in the context of the application using the library. The vulnerability is rooted in how `asteval` performs handling of `FormattedValue` AST nodes. In particular, the `on_formattedvalue` value uses the dangerous format method of the str class. The code allows an attacker to manipulate the value of the string used in the dangerous call `fmt.format(__fstring__=val)`. This vulnerability can be exploited to access protected attributes by intentionally triggering an `AttributeError` exception. The attacker can then catch the exception and use its `obj` attribute to gain arbitrary access to sensitive or protected object properties. Version 1.0.6 fixes this issue.(CVE-2025-24359)","modified":"2025-10-31T19:20:08.331970Z","published":"2025-10-31T14:12:52Z","upstream":["CVE-2025-24359"],"database_specific":{"severity":"High"},"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2558"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-24359"}],"affected":[{"package":{"name":"python-asteval","ecosystem":"openEuler:22.03-LTS-SP4","purl":"pkg:rpm/openEuler/python-asteval&distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.25-1.oe2203sp4"}]}],"ecosystem_specific":{"noarch":["python-asteval-help-0.9.25-1.oe2203sp4.noarch.rpm","python3-asteval-0.9.25-1.oe2203sp4.noarch.rpm"],"src":["python-asteval-0.9.25-1.oe2203sp4.src.rpm"]},"database_specific":{"source":"https://repo.openeuler.org/security/data/osv/OESA-2025-2558.json"}}],"schema_version":"1.7.3"}