Arbitrary Code Execution Vulnerability in Conda-Build from Anaconda Inc.
CVE-2025-32798

8.2HIGH

Key Information:

Vendor

Conda

Vendor
CVE Published:
16 June 2025

What is CVE-2025-32798?

Conda-Build, a tool for building conda packages, is susceptible to arbitrary code execution due to unsafe evaluation of recipe selectors in meta.yaml files before version 25.4.0. The use of the eval function lacks proper input sanitization, allowing potentially malicious code to be executed during the package build process. This exposes the build environment to unauthorized commands and file operations, undermining the security of the packaging system. Users are encouraged to upgrade to version 25.4.0 or later to mitigate this risk.

Affected Version(s)

conda-build < 25.4.0

References

CVSS V4

Score:
8.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-32798 : Arbitrary Code Execution Vulnerability in Conda-Build from Anaconda Inc.