Skip to content

matplotlib-3.10.7-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.whl: 4 vulnerabilities (highest severity is: 8.1) [master] (reachable) #40

@renovate

Description

@renovate
📂 Vulnerable Library - matplotlib-3.10.7-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.whl

Python plotting package

Path to dependency file: /examples/ai/image_search/.ws-temp-GKUPSC-requirements.txt

Path to vulnerable library: /home/wss-scanner/.cache/pypoetry/virtualenvs/image-search-l61iL2F1-py3.11/lib/python3.11/site-packages/matplotlib-3.10.7.dist-info

Findings

Finding Severity 🎯 CVSS Exploit Maturity EPSS Library Type Fixed in Remediation Available Reachability
CVE-2023-50447 🔴 High 8.1 Not Defined < 1% Pillow-9.5.0-cp311-cp311-manylinux_2_28_x86_64.whl Transitive N/A Reachable
CVE-2023-45139 🔴 High 7.5 Not Defined < 1% fonttools-4.39.4-py3-none-any.whl Transitive N/A Unreachable
CVE-2024-28219 🟠 Medium 6.7 Not Defined < 1% Pillow-9.5.0-cp311-cp311-manylinux_2_28_x86_64.whl Transitive N/A Reachable
CVE-2025-66034 🟠 Medium 6.3 Not Defined < 1% fonttools-4.39.4-py3-none-any.whl Transitive N/A Unreachable

Details

🔴CVE-2023-50447

Vulnerable Library - Pillow-9.5.0-cp311-cp311-manylinux_2_28_x86_64.whl

Python Imaging Library (Fork)

Library home page: https://files.pythonhosted.org/packages/3d/59/e6bd2c3715ace343d9739276ceed79657fe116923238d102cf731ab463dd/Pillow-9.5.0-cp311-cp311-manylinux_2_28_x86_64.whl

Path to dependency file: /examples/ai/image_search/.ws-temp-GKUPSC-requirements.txt

Path to vulnerable library: /home/wss-scanner/.cache/pypoetry/virtualenvs/image-search-l61iL2F1-py3.11/lib/python3.11/site-packages/Pillow-9.5.0.dist-info

Dependency Hierarchy:

  • matplotlib-3.10.7-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.whl (Root Library)
    • Pillow-9.5.0-cp311-cp311-manylinux_2_28_x86_64.whl (Vulnerable Library)

Reachability Analysis

This vulnerability is potentially reachable:

- supabase/examples/ai/image_search/image_search/main.py (Application)
    - Pillow-9.5.0/PIL/Image.py (Extension)
        -> ❌ Pillow-9.5.0/PIL/TiffImagePlugin.py (Vulnerable Component)

Vulnerability Details

Pillow through 10.1.0 allows PIL.ImageMath.eval Arbitrary Code Execution via the environment parameter, a different vulnerability than CVE-2022-22817 (which was about the expression parameter).

Publish Date: Jan 19, 2024 12:00 AM

URL: CVE-2023-50447

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 8.1


Suggested Fix

Type: Upgrade version

Origin: https://www.openwall.com/lists/oss-security/2024/01/20/1

Release Date: Jan 19, 2024 12:00 AM

Fix Resolution : pillow - 10.2.0

🔴CVE-2023-45139

Vulnerable Library - fonttools-4.39.4-py3-none-any.whl

Tools to manipulate font files

Library home page: https://files.pythonhosted.org/packages/ad/5f/20da4f41e33e77723b0100ded6539529bd159319ed49d6459a4647cdc7ee/fonttools-4.39.4-py3-none-any.whl

Path to dependency file: /examples/ai/image_search/.ws-temp-GKUPSC-requirements.txt

Path to vulnerable library: /home/wss-scanner/.cache/pypoetry/virtualenvs/image-search-l61iL2F1-py3.11/lib/python3.11/site-packages/fonttools-4.39.4.dist-info

Dependency Hierarchy:

  • matplotlib-3.10.7-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.whl (Root Library)
    • fonttools-4.39.4-py3-none-any.whl (Vulnerable Library)

Reachability Analysis

The vulnerable code is unreachable


Vulnerability Details

fontTools is a library for manipulating fonts, written in Python. The subsetting module has a XML External Entity Injection (XXE) vulnerability which allows an attacker to resolve arbitrary entities when a candidate font (OT-SVG fonts), which contains a SVG table, is parsed. This allows attackers to include arbitrary files from the filesystem fontTools is running on or make web requests from the host system. This vulnerability has been patched in version 4.43.0.

Publish Date: Jan 10, 2024 04:03 PM

URL: CVE-2023-45139

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 7.5


Suggested Fix

Type: Upgrade version

Origin:

Release Date:

Fix Resolution :

🟠CVE-2024-28219

Vulnerable Library - Pillow-9.5.0-cp311-cp311-manylinux_2_28_x86_64.whl

Python Imaging Library (Fork)

Library home page: https://files.pythonhosted.org/packages/3d/59/e6bd2c3715ace343d9739276ceed79657fe116923238d102cf731ab463dd/Pillow-9.5.0-cp311-cp311-manylinux_2_28_x86_64.whl

Path to dependency file: /examples/ai/image_search/.ws-temp-GKUPSC-requirements.txt

Path to vulnerable library: /home/wss-scanner/.cache/pypoetry/virtualenvs/image-search-l61iL2F1-py3.11/lib/python3.11/site-packages/Pillow-9.5.0.dist-info

Dependency Hierarchy:

  • matplotlib-3.10.7-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.whl (Root Library)
    • Pillow-9.5.0-cp311-cp311-manylinux_2_28_x86_64.whl (Vulnerable Library)

Reachability Analysis

This vulnerability is potentially reachable:

- supabase/examples/ai/image_search/image_search/main.py (Application)
    - Pillow-9.5.0/PIL/Image.py (Extension)
        -> ❌ Pillow-9.5.0/PIL/TiffImagePlugin.py (Vulnerable Component)

Vulnerability Details

In _imagingcms.c in Pillow before 10.3.0, a buffer overflow exists because strcpy is used instead of strncpy.

Publish Date: Apr 03, 2024 12:00 AM

URL: CVE-2024-28219

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 6.7


Suggested Fix

Type: Upgrade version

Origin:

Release Date:

Fix Resolution :

🟠CVE-2025-66034

Vulnerable Library - fonttools-4.39.4-py3-none-any.whl

Tools to manipulate font files

Library home page: https://files.pythonhosted.org/packages/ad/5f/20da4f41e33e77723b0100ded6539529bd159319ed49d6459a4647cdc7ee/fonttools-4.39.4-py3-none-any.whl

Path to dependency file: /examples/ai/image_search/.ws-temp-GKUPSC-requirements.txt

Path to vulnerable library: /home/wss-scanner/.cache/pypoetry/virtualenvs/image-search-l61iL2F1-py3.11/lib/python3.11/site-packages/fonttools-4.39.4.dist-info

Dependency Hierarchy:

  • matplotlib-3.10.7-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.whl (Root Library)
    • fonttools-4.39.4-py3-none-any.whl (Vulnerable Library)

Reachability Analysis

The vulnerable code is unreachable


Vulnerability Details

fontTools is a library for manipulating fonts, written in Python. In versions from 4.33.0 to before 4.60.2, the fonttools varLib (or python3 -m fontTools.varLib) script has an arbitrary file write vulnerability that leads to remote code execution when a malicious .designspace file is processed. The vulnerability affects the main() code path of fontTools.varLib, used by the fonttools varLib CLI and any code that invokes fontTools.varLib.main(). This issue has been patched in version 4.60.2.

Publish Date: Nov 29, 2025 01:07 AM

URL: CVE-2025-66034

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 6.3


Suggested Fix

Type: Upgrade version

Origin: GHSA-768j-98cg-p3fv

Release Date: Nov 29, 2025 01:07 AM

Fix Resolution : fonttools - 4.60.2,fonttools - 4.60.2,https://github.com/fonttools/fonttools.git - 4.60.2

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions