Cyber Posture

CVE-2025-27510

N/A

Published: 04 March 2025

Published
04 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score N/A
EPSS Score 0.0632 91.0th percentile
Risk Priority 4 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-27510 is a uncategorised-severity Inclusion of Functionality from Untrusted Control Sphere (CWE-829) vulnerability. Its CVSS base score is N/A.

Operationally, exploitation aligns with the MITRE ATT&CK technique Compromise Software Dependencies and Development Tools (T1195.001); ranked in the top 9.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 CM-14 (Signed Components) and SR-11 (Component Authenticity).

Threat & Defense at a Glance

What attackers do: exploitation maps to Compromise Software Dependencies and Development Tools (T1195.001). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires verification of component authenticity prior to use, directly preventing execution of malicious code from threat actors hijacking unclaimed package names like conda-oci-mirror.

prevent

Mandates digital signatures and enforcement for software components before installation and execution, mitigating RCE risks from untrusted optional dependencies.

prevent

Requires proof of provenance for components, ensuring unclaimed and unproven packages like conda-oci-mirror are not trusted or incorporated.

MITRE ATT&CK Enterprise TechniquesAI

T1195.001 Compromise Software Dependencies and Development Tools Initial Access
Adversaries may manipulate software dependencies and development tools prior to receipt by a final consumer for the purpose of data or system compromise.
Why these techniques?

The CVE describes inclusion of an unclaimed optional dependency (CWE-829) that an attacker can register on PyPI with malicious code, directly enabling compromise of software dependencies for RCE.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

conda-forge-metadata provides programatic access to conda-forge's metadata. conda-forge-metadata uses an optional dependency - "conda-oci-mirror" which was neither present on the PyPi repository nor registered by any entity. If conda-oci-mirror is taken over by a threat actor, it can result in…

more

remote code execution.

Deeper analysisAI

CVE-2025-27510 is a vulnerability in the conda-forge-metadata package, which provides programmatic access to conda-forge's metadata. The issue arises from an optional dependency on "conda-oci-mirror", a package name that was neither present on the PyPI repository nor registered by any entity. This configuration aligns with CWE-829 (Inclusion of Functionality from Untrusted Control Sphere), creating a risk where a threat actor could claim the package name and introduce malicious code, potentially resulting in remote code execution.

The vulnerability can be exploited by any threat actor who registers the unclaimed "conda-oci-mirror" package on PyPI and uploads a malicious version. Users of conda-forge-metadata who enable or install this optional dependency are at risk, as it would lead to execution of the attacker's code on their systems, enabling remote code execution.

Mitigation details are outlined in the GitHub security advisory GHSA-vwfh-m3q7-9jpw for conda-forge-metadata, available at https://github.com/conda-forge/conda-forge-metadata/security/advisories/GHSA-vwfh-m3q7-9jpw. The dependency is declared in the project's pyproject.toml file at https://github.com/conda-forge/conda-forge-metadata/blob/799aee36b21ee06289d73d57838b28201f5a57af/pyproject.toml#L28.

Details

CWE(s)

CVEs Like This One

CVE-2025-27607Shared CWE-829
CVE-2026-43569Shared CWE-829
CVE-2025-15612Shared CWE-829
CVE-2026-22865Shared CWE-829
CVE-2026-26974Shared CWE-829
CVE-2026-28372Shared CWE-829
CVE-2026-4295Shared CWE-829
CVE-2025-62726Shared CWE-829
CVE-2026-41396Shared CWE-829
CVE-2026-1699Shared CWE-829

References