Multiple vulnerabilities have been discovered in the `telnyx` Python package, where versions 4.87.1 and 4.87.2 were compromised with credential-stealing malware. Users who installed or upgraded `telnyx` between March 27, 2026, 03:51 UTC and 10:13 UTC are at high risk. An upgrade to the latest version is recommended, but thorough remediation steps are crucial.
These vulnerabilities allow for arbitrary code execution and sensitive data exfiltration.
What is Telnyx?
MAL-2026-2254: Malicious code execution in Telnyx
No CVSS score provided.
No EPSS score provided.
The `telnyx` package version 4.87.2 was identified as malicious by the OpenSSF Package Analysis project. The package executes commands associated with malicious behavior, posing a significant security risk.
How to fix MAL-2026-2254 in Telnyx
Patch immediately- 1.Upgrade to the latest version of the `telnyx` package.
pip install --upgrade telnyxWorkaround: Avoid using version 4.87.2 of the `telnyx` package.
NextGuard automatically flags MAL-2026-2254 if Telnyx appears in any of your monitored projects — no manual lookup required.
PYSEC-2026-3: Credential harvesting malware in Telnyx
No CVSS score provided.
No EPSS score provided.
Two `telnyx` versions were published containing credential harvesting malware after an API token exposure. The compromised versions execute code during import, downloading further stages from a remote host and exfiltrating sensitive credentials and files.
How to fix PYSEC-2026-3 in Telnyx
Patch immediately- 1.Upgrade to the latest version of the `telnyx` package.
- 2.Revoke and rotate all potentially exposed credentials.
- 3.Isolate and analyze affected systems for malicious actions and modifications.
pip install --upgrade telnyxWorkaround: Avoid using versions 4.87.1 and 4.87.2 of the `telnyx` package.
NextGuard automatically flags PYSEC-2026-3 if Telnyx appears in any of your monitored projects — no manual lookup required.
GHSA-955r-262c-33jc: Malicious code in Telnyx versions 4.87.1 and 4.87.2
Critical severity due to remote code execution.
No EPSS score provided.
A threat actor used compromised PyPI credentials to publish malicious versions of the `telnyx` package directly to PyPI. These versions contained credential-stealing malware that executes upon import of the `telnyx` module.
How to fix GHSA-955r-262c-33jc in Telnyx
Patch immediately- 1.Check if you are affected by verifying the installed version and pip cache.
- 2.Remove compromised versions using `pip uninstall telnyx`.
- 3.Rotate all potentially exposed secrets, including SSH keys, cloud credentials, and database passwords.
- 4.Check for persistence mechanisms on Linux/macOS and Windows systems.
- 5.Pin to a safe version (4.87.0) using `pip install telnyx==4.87.0`.
pip install --upgrade telnyxVerify with:
pip show telnyx | grep VersionWorkaround: Pin your `telnyx` dependency to version 4.87.0 to avoid the compromised versions.
NextGuard automatically flags GHSA-955r-262c-33jc if Telnyx appears in any of your monitored projects — no manual lookup required.
Stay ahead of Python vulnerabilities
Proactively detect and remediate vulnerabilities in your Python dependencies. Use NextGuard to monitor your python dependencies and receive alerts on new threats.
Compare PlansFrequently asked questions
The compromise of the `telnyx` package highlights the importance of supply chain security and proactive vulnerability management. Stay vigilant, regularly update your dependencies, and see all python vulnerabilities to mitigate potential risks. By taking these steps, you can protect your systems from similar attacks.
Related topics