Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13837: Vulnerability in Python Software Foundation CPython

0
Low
VulnerabilityCVE-2025-13837cvecve-2025-13837
Published: Mon Dec 01 2025 (12/01/2025, 18:13:32 UTC)
Source: CVE Database V5
Vendor/Project: Python Software Foundation
Product: CPython

Description

When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues

AI-Powered Analysis

AILast updated: 01/07/2026, 19:46:16 UTC

Technical Analysis

CVE-2025-13837 is a vulnerability identified in the plistlib module of CPython, the reference implementation of the Python programming language maintained by the Python Software Foundation. The plistlib module is responsible for parsing plist (property list) files, a format commonly used for configuration and data serialization, especially in Apple ecosystems but also in cross-platform applications. The vulnerability stems from the module reading data sizes directly from the plist file without sufficient validation or bounds checking. This allows an attacker to craft a malicious plist file that specifies an arbitrarily large size for data sections. When the vulnerable plistlib module attempts to read this data, it allocates memory based on the specified size, potentially exhausting system memory resources. This can cause an Out-Of-Memory (OOM) condition, leading to a Denial of Service (DoS) where the affected process or system becomes unresponsive or crashes. The vulnerability affects CPython versions from 0 up to 3.15.0a1, indicating it is present in all released versions up to the alpha of 3.15.0. The CVSS 4.0 base score is 2.1, reflecting a low severity primarily due to the local vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and limited impact on confidentiality, integrity, and availability. The weakness corresponds to CWE-400 (Uncontrolled Resource Consumption), highlighting the risk of resource exhaustion. No patches or fixes have been published at the time of disclosure, and no known exploits have been observed in the wild. The attack requires supplying a malicious plist file to a vulnerable Python environment, which may limit exposure to scenarios where untrusted plist files are processed.

Potential Impact

For European organizations, the primary impact of CVE-2025-13837 is the risk of Denial of Service through resource exhaustion when processing malicious plist files in Python environments. Organizations that utilize Python for automation, configuration management, or application development involving plist files could see service disruptions or crashes if exposed to crafted files. This could affect development environments, CI/CD pipelines, or production systems that parse plist data without adequate input validation. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact could disrupt business operations, especially in sectors relying heavily on Python-based tooling. The low CVSS score and lack of known exploits suggest limited immediate risk, but the potential for DoS in critical systems warrants attention. European entities with extensive Python usage, such as financial institutions, technology firms, and research organizations, should assess their exposure. Additionally, organizations integrating Apple ecosystem data or cross-platform applications using plist files may be more vulnerable. The absence of patches means mitigation currently relies on operational controls and input validation.

Mitigation Recommendations

To mitigate CVE-2025-13837, European organizations should implement the following specific measures: 1) Restrict processing of plist files to trusted sources only, avoiding ingestion of untrusted or unauthenticated plist data. 2) Implement input validation and size checks on plist files before parsing, for example by pre-scanning files to detect unusually large size declarations or malformed content. 3) Use sandboxing or resource-limiting techniques (such as cgroups or container limits) to constrain memory usage of processes that parse plist files, preventing system-wide impact from OOM conditions. 4) Monitor Python environments for abnormal memory consumption or crashes related to plistlib usage. 5) Stay informed on updates from the Python Software Foundation and apply patches promptly once released. 6) Where feasible, consider using alternative plist parsing libraries or tools that have implemented robust input validation. 7) Educate developers and system administrators about the risks of processing untrusted plist files and encourage secure coding practices. These targeted actions go beyond generic advice by focusing on controlling input sources, enforcing resource limits, and proactive monitoring tailored to the nature of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
PSF
Date Reserved
2025-12-01T17:54:41.439Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692ddb371fcc71981e81acf2

Added to database: 12/1/2025, 6:15:19 PM

Last enriched: 1/7/2026, 7:46:16 PM

Last updated: 1/15/2026, 10:53:49 PM

Views: 213

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats