-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| check-jsonschema | pip | < 0.30.0 | 0.30.0 |
The core vulnerability stemmed from predictable cache filenames. 1) BoundCacheDownloader's filename logic used the URL's basename directly, allowing trivial cache collisions. 2) The resolver's MD5-based hashing (though removed in the patch) was insufficiently collision-resistant. The commit introduced SHA-256 hashing (url_to_cache_filename) and removed both vulnerable filename generation methods, confirming their role in the vulnerability.
KEV Misses 88% of Exploited CVEs- Get the report