Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15282: CWE-93 in Python Software Foundation CPython

0
Medium
VulnerabilityCVE-2025-15282cvecve-2025-15282cwe-93
Published: Tue Jan 20 2026 (01/20/2026, 21:35:13 UTC)
Source: CVE Database V5
Vendor/Project: Python Software Foundation
Product: CPython

Description

User-controlled data URLs parsed by urllib.request.DataHandler allow injecting headers through newlines in the data URL mediatype.

AI-Powered Analysis

AILast updated: 02/05/2026, 08:19:07 UTC

Technical Analysis

CVE-2025-15282 is a vulnerability categorized under CWE-93 (Improper Neutralization of CRLF Sequences in HTTP Headers) affecting the Python Software Foundation's CPython implementation. The issue arises in the urllib.request.DataHandler component, which processes data URLs. Specifically, when user-controlled data URLs include newline characters within the mediatype portion, these newlines can be exploited to inject arbitrary HTTP headers. This header injection can lead to HTTP response splitting attacks, enabling attackers to manipulate HTTP responses, potentially causing cache poisoning, cross-site scripting (XSS), or session fixation attacks. The vulnerability affects all CPython versions up to 3.15.0a1, including the initial 0 version, indicating a longstanding issue. The CVSS 4.0 score is 6.0 (medium severity), reflecting network attack vector, low attack complexity, partial privileges required, no user interaction, and high impact on integrity but no impact on confidentiality or availability. No patches or known exploits have been reported at the time of publication. The vulnerability is particularly relevant for applications that parse untrusted data URLs using urllib.request.DataHandler, such as web frameworks, API clients, or other networked Python applications. Exploitation could allow attackers to inject malicious headers, potentially bypassing security controls or manipulating application behavior.

Potential Impact

For European organizations, the impact of CVE-2025-15282 can be significant, especially for those heavily reliant on Python-based web services, APIs, or networked applications that handle untrusted input. Successful exploitation could lead to HTTP response splitting attacks, enabling attackers to perform cache poisoning, redirect users to malicious sites, or inject malicious scripts, thereby compromising user confidentiality and application integrity. This could result in data breaches, loss of user trust, and regulatory non-compliance under GDPR if personal data is exposed or manipulated. The medium severity rating suggests that while the vulnerability is not critical, it still poses a meaningful risk, particularly in environments where Python is used extensively and where data URLs are processed without sufficient validation. The lack of user interaction and the ability to exploit over the network increase the threat surface. Organizations running vulnerable CPython versions in production, especially in sectors like finance, healthcare, and government, could face targeted attacks leveraging this vulnerability.

Mitigation Recommendations

To mitigate CVE-2025-15282, European organizations should take the following specific actions: 1) Monitor for and apply official patches or updates from the Python Software Foundation as soon as they become available, upgrading to versions beyond 3.15.0a1 that address this issue. 2) Implement strict input validation and sanitization on all data URLs before processing them with urllib.request.DataHandler, explicitly rejecting or encoding newline characters in the mediatype portion to prevent header injection. 3) Employ application-layer firewalls or web application firewalls (WAFs) configured to detect and block suspicious HTTP header injection patterns or response splitting attempts. 4) Conduct code audits and security reviews of Python applications that handle data URLs, ensuring that untrusted input is never directly passed to urllib.request.DataHandler without proper checks. 5) Use network monitoring tools to identify anomalous HTTP responses that may indicate exploitation attempts. 6) Educate developers about the risks of improper handling of data URLs and encourage secure coding practices around HTTP header construction. These measures, combined, reduce the risk of exploitation until patches are fully deployed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
PSF
Date Reserved
2025-12-29T21:04:54.816Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696ff8c24623b1157c513cfb

Added to database: 1/20/2026, 9:50:58 PM

Last enriched: 2/5/2026, 8:19:07 AM

Last updated: 2/7/2026, 12:58:26 PM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats