oss-sec mailing list archives
8 CVEs in Cpython announced this week
From: Alan Coopersmith <alan.coopersmith () oracle com>
Date: Fri, 23 Jan 2026 13:01:49 -0800
https://mail.python.org/archives/list/security-announce () python org/thread/FELSEOLBI2QR6YLG6Q7VYF7FWSGQTKLI/ announces:
[CVE-2025-11468] Folding email comments of unfoldable characters doesn't preserve parenthesis
There is a MEDIUM severity vulnerability affecting CPython.
When folding a long comment in an email header containing exclusively
unfoldable characters, the parenthesis would not be preserved. This could
be used for injecting headers into email messages where addresses are
user-controlled and not sanitized.
Please see the linked CVE ID for the latest information on affected
versions:
https://www.cve.org/CVERecord?id=CVE-2025-11468
https://github.com/python/cpython/pull/143936
https://www.cve.org/CVERecord?id=CVE-2025-11468 lists affected versions as "affected from 0 before 3.15.0" ------------------------------------------------------------------------ https://mail.python.org/archives/list/security-announce () python org/thread/DD7C7JZJYTBXMDOWKCEIEBJLBRU64OMR/ announces:
[CVE-2025-15366] IMAP command injection in user-controlled commands
There is a MEDIUM severity vulnerability affecting CPython.
The imaplib module, when passed a user-controlled command, can have
additional commands injected using newlines. Mitigation rejects commands
containing control characters.
Please see the linked CVE ID for the latest information on affected
versions:
https://www.cve.org/CVERecord?id=CVE-2025-15366
https://github.com/python/cpython/pull/143922
https://www.cve.org/CVERecord?id=CVE-2025-15366 lists affected versions as "affected from 0 before 3.15.0" ------------------------------------------------------------------------ https://mail.python.org/archives/list/security-announce () python org/thread/CBFBOWVGGUJFSGITQCCBZS4GEYYZ7ZNE/ announces:
[CVE-2025-15367] POP3 command injection in user-controlled commands
There is a MEDIUM severity vulnerability affecting CPython.
The poplib module, when passed a user-controlled command, can have
additional commands injected using newlines. Mitigation rejects commands
containing control characters.
Please see the linked CVE ID for the latest information on affected
versions:
https://www.cve.org/CVERecord?id=CVE-2025-15367
https://github.com/python/cpython/pull/143924
https://www.cve.org/CVERecord?id=CVE-2025-15367 lists affected versions as "affected from 0 before 3.15.0" ------------------------------------------------------------------------ https://mail.python.org/archives/list/security-announce () python org/thread/X66HL7SISGJT33J53OHXMZT4DFLMHVKF/ announces:
[CVE-2025-15282] Header injection via newlines in data URL mediatype
There is a MEDIUM severity vulnerability affecting CPython.
User-controlled data URLs parsed by urllib.request.DataHandler allow
injecting headers through newlines in the data URL mediatype.
Please see the linked CVE ID for the latest information on affected
versions:
https://www.cve.org/CVERecord?id=CVE-2025-15282
https://github.com/python/cpython/pull/143926
https://www.cve.org/CVERecord?id=CVE-2025-15282 lists affected versions as "affected from 0 before 3.15.0" ------------------------------------------------------------------------ https://mail.python.org/archives/list/security-announce () python org/thread/6VFLQQEIX673KXKFUZXCUNE5AZOGZ45M/ announces:
[CVE-2026-0672] Header injection in http.cookies.Morsel
There is a MEDIUM severity vulnerability affecting CPython.
When using http.cookies.Morsel, user-controlled cookie values and
parameters can allow injecting HTTP headers into messages. Patch rejects
all control characters within cookie names, values, and parameters.
Please see the linked CVE ID for the latest information on affected
versions:
https://www.cve.org/CVERecord?id=CVE-2026-0672
https://github.com/python/cpython/pull/143920
https://www.cve.org/CVERecord?id=CVE-2026-0672 lists affected versions as "affected from 0 before 3.15.0" ------------------------------------------------------------------------ https://mail.python.org/archives/list/security-announce () python org/thread/6ZZULGALJTITEAGEXLDJE2C6FORDXPBT/ announces:
[CVE-2026-1299] email BytesGenerator header injection due to unquoted newlines
There is a MEDIUM severity vulnerability affecting CPython.
The email module, specifically the "BytesGenerator" class, didn’t properly
quote newlines for email headers when
serializing an email message allowing for header injection when an email is
serialized. This is only applicable if using "LiteralHeader" while writing
headers that don't respect email folding rules, the new behavior will
reject the incorrectly folded headers in "BytesGenerator".
Please see the linked CVE ID for the latest information on
affected versions:
https://www.cve.org/CVERecord?id=CVE-2026-1299
https://github.com/python/cpython/pull/144126
https://www.cve.org/CVERecord?id=CVE-2026-1299 lists affected versions as "affected from 0 before 3.15.0" ------------------------------------------------------------------------ https://mail.python.org/archives/list/security-announce () python org/thread/BJ6QPHNSHJTS3A7CFV6IBMCAP2DWRVNT/ announces:
[CVE-2026-0865] wsgiref.headers.Headers allows header newline injection There is a MEDIUM severity vulnerability affecting CPython. User-controlled header names and values containing newlines can allow injecting HTTP headers. Please see the linked CVE ID for the latest information on affected versions: https://www.cve.org/CVERecord?id=CVE-2026-0865 https://github.com/python/cpython/pull/143917
https://www.cve.org/CVERecord?id=CVE-2026-0865 lists affected versions as "affected from 0 before 3.15.0" ------------------------------------------------------------------------ https://mail.python.org/archives/list/security-announce () python org/thread/KRI7GC6S27YV5NJ4FPDALS2WI5ENAFJ6/ announces:
[CVE-2025-12781] base64.b64decode() always accepts "+/" characters, despite setting altchars
There is a MEDIUM severity vulnerability affecting CPython.
When passing data to the b64decode(), standard_b64decode(), and
urlsafe_b64decode() functions in the "base64" module the characters "+/"
will always be accepted, regardless of the value of "altchars" parameter,
typically used to establish an "alternative base64 alphabet" such as the
URL safe alphabet. This behavior matches what is recommended in earlier
base64 RFCs, but newer RFCs now recommend either dropping characters
outside the specified base64 alphabet or raising an error. The old behavior
has the possibility of causing data integrity issues.
This behavior can only be insecure if your application uses an alternate
base64 alphabet (without "+/"). If your application does not use the
"altchars" parameter or the urlsafe_b64decode() function, then your
application does not use an alternative base64 alphabet.
The attached patches DO NOT make the base64-decode behavior raise an error,
as this would be a change in behavior and break existing programs. Instead,
the patch deprecates the behavior which will be replaced with the newly
recommended behavior in a future version of Python. Users are recommended
to mitigate by verifying user-controlled inputs match the base64
alphabet they are expecting or verify that their application would not be
affected if the b64decode() functions accepted "+" or "/" outside of
altchars.
Please see the linked CVE ID for the latest information on affected
versions:
https://www.cve.org/CVERecord?id=CVE-2025-12781
https://github.com/python/cpython/pull/141128
https://www.cve.org/CVERecord?id=CVE-2025-12781 lists affected versions as * "affected from 0 before 3.13.10" * "affected from 3.14.0 before 3.14.1" * "affected from 3.15.0a1 before 3.15.0a2" -- -Alan Coopersmith- alan.coopersmith () oracle com Oracle Solaris Engineering - https://blogs.oracle.com/solaris
Current thread:
- 8 CVEs in Cpython announced this week Alan Coopersmith (Jan 23)
