{"schema_version":"1.7.5","id":"MAL-2025-191937","published":"2025-11-14T07:57:01Z","modified":"2026-03-19T12:58:29.724245Z","summary":"Malicious code in xsltproc (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (9038d06e907a027d385f7ef9111815ca61e7b26fce85196a549c20e02447adc4)\nInstalling the package or importing the module exfiltrates basic information about the host, and the package has no other purpose.\n\n\n---\n\nCategory: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities.\n\n\nCampaign: GENERIC-standard-pypi-install-pentest\n\n\nReasons (based on the campaign):\n\n\n - The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.\n\n\n - The package overrides the install command in setup.py to execute malicious code during installation.\n","affected":[{"package":{"name":"xsltproc","ecosystem":"PyPI","purl":"pkg:pypi/xsltproc"},"versions":["0.0.1","0.0.0"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/xsltproc/MAL-2025-191937.json"}}],"references":[{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/xsltproc"}],"database_specific":{"malicious-packages-origins":[{"id":"pypi/GENERIC-standard-pypi-install-pentest/xsltproc","import_time":"2025-12-02T22:30:56.516550288Z","modified_time":"2025-11-14T07:57:01.005024Z","sha256":"94b6ec5a0fb20f1b9fa39f68bf162310cba022382218c6e1bd780b9d20df6492","source":"kam193","versions":["0.0.1","0.0.0"]},{"id":"pypi/GENERIC-standard-pypi-install-pentest/xsltproc","import_time":"2025-12-02T23:07:19.700668599Z","modified_time":"2025-11-14T07:57:01.005024Z","sha256":"9038d06e907a027d385f7ef9111815ca61e7b26fce85196a549c20e02447adc4","source":"kam193","versions":["0.0.1","0.0.0"]},{"id":"RLMA-2025-06599","import_time":"2025-12-24T10:07:31.60704712Z","modified_time":"2025-12-23T08:40:08Z","sha256":"5e115c4d9e37a74425bbfeb354346eed891480d56449f622b55365587a6fad5e","source":"reversing-labs","versions":["0.0.1"]},{"id":"pypi/GENERIC-standard-pypi-install-pentest/xsltproc","import_time":"2025-12-30T22:39:04.374152289Z","modified_time":"2025-11-14T07:57:01.005024Z","sha256":"9e2645a5079046dd2c4cac20f820bcc2ff680dec5e0d4d8d122e3aaf20218cf1","source":"kam193","versions":["0.0.0","0.0.1"]},{"id":"RLUA-2026-00938","import_time":"2026-03-19T12:20:45.127737114Z","modified_time":"2026-03-18T12:20:46Z","sha256":"ad9780b20cabbcb8decdfe592cfc4a5d843e325fdcebcfc83d6cf22b82241f1b","source":"reversing-labs"}]},"credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"]},{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"},{"name":"ReversingLabs","contact":["https://www.reversinglabs.com"],"type":"FINDER"}]}