CVE-2026-22702
mediumCVSS v3 Base Score
4.5
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score
0.0%
Exploitation probability in 30 days
Top 98% most likely to be exploited
Attack Characteristics
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Confidentiality
Low
Integrity
Low
Availability
Low
Vulnerability Report
Generated by CyberWatcher
Description
virtualenv is a tool for creating isolated virtual python environments. Prior to version 20.36.1, TOCTOU (Time-of-Check-Time-of-Use) vulnerabilities in virtualenv allow local attackers to perform symlink-based attacks on directory creation operations. An attacker with local access can exploit a race condition between directory existence checks and creation to redirect virtualenv's app_data and lock file operations to attacker-controlled locations. This issue has been patched in version 20.36.1.
CWE
CWE-59Affected Products
OpenShift LightspeedOpenShift Service Mesh 2Red Hat Ansible Automation Platform 2Red Hat Enterprise Linux 8Red Hat OpenShift AI (RHOAI)Red Hat OpenShift Dev SpacesRed Hat Satellite 6