A critical vulnerability has been identified in the Telnyx Python package. Malicious versions 4.87.1 and 4.87.2, published on March 27, 2026, contain credential-stealing malware. A patch is available; immediate action is required to mitigate the risk of data compromise.
This vulnerability has a CVSS score of 9.5, indicating a critical level of severity due to the potential for widespread exploitation and significant impact.
What is Telnyx?
Telnyx Python Package Compromise
Critical: Remote code execution and credential theft.
An attacker compromised PyPI credentials and uploaded malicious versions 4.87.1 and 4.87.2 of the `telnyx` Python package directly to PyPI, bypassing the legitimate GitHub release pipeline. These versions contain credential-stealing malware that executes upon import.
How to fix GHSA-955r-262c-33jc in Telnyx
Patch immediately- 1.Uninstall the compromised version of the Telnyx package.
- 2.Rotate all potentially exposed secrets.
- 3.Pin the Telnyx package to a safe version.
pip uninstall telnyxVerify with:
pip show telnyx | grep VersionWorkaround: There is no workaround other than uninstalling the compromised version and patching.
NextGuard automatically flags CVE-GHSA-955r-262c-33jc if `telnyx` appears in any of your monitored projects — no manual lookup required.
Stay ahead of Python vulnerabilities
Proactively identify and address vulnerabilities in your Python dependencies. Regularly scanning your projects can help prevent exploitation and data breaches. monitor your python dependencies
Compare your dependenciesFrequently asked questions
The compromise of the Telnyx Python package highlights the importance of secure dependency management and proactive vulnerability scanning. Take immediate action to patch your systems and rotate any potentially compromised secrets. see all python vulnerabilities
Related topics