7.5
CWE
367 362
Advisory Published
Updated

CVE-2025-32784: conda-forge-webservices has an Unauthorized Artifact Modification Race Condition

First published: Tue Apr 15 2025(Updated: )

conda-forge-webservices is the web app deployed to run conda-forge admin commands and linting. In versions prior to 2025.4.10, a race condition vulnerability has been identified in the conda-forge-webservices component used within the shared build infrastructure. This vulnerability, categorized as a Time-of-Check to Time-of-Use (TOCTOU) issue, can be exploited to introduce unauthorized modifications to build artifacts stored in the cf-staging Anaconda channel. Exploitation may result in the unauthorized publication of malicious artifacts to the production conda-forge channel. The core vulnerability results from the absence of atomicity between the hash validation and the artifact copy operation. This gap allows an attacker, with access to the cf-staging token, to overwrite the validated artifact with a malicious version immediately after hash verification, but before the copy action is executed. As the cf-staging channel permits artifact overwrites, such an operation can be carried out using the anaconda upload --force command. This vulnerability is fixed in 2025.4.10.

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
conda-forge-webservices<2025.4.10

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2025-32784?

    The severity of CVE-2025-32784 is categorized based on its potential impact, but detailed metrics are not specified here.

  • How do I fix CVE-2025-32784?

    To fix CVE-2025-32784, update the conda-forge-webservices to version 2025.4.10 or later.

  • What versions of conda-forge-webservices are affected by CVE-2025-32784?

    CVE-2025-32784 affects all versions of conda-forge-webservices prior to version 2025.4.10.

  • What is a race condition as mentioned in CVE-2025-32784?

    A race condition in CVE-2025-32784 refers to a situation where two or more processes access shared resources concurrently, leading to inconsistent results.

  • Is there a workaround for CVE-2025-32784 if I can't upgrade?

    There is no specific workaround for CVE-2025-32784 other than upgrading to a fixed version.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203