Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15282: CWE-93 in Python Software Foundation CPython

0
Medium
VulnerabilityCVE-2025-15282cvecve-2025-15282cwe-93
Published: Tue Jan 20 2026 (01/20/2026, 21:35:13 UTC)
Source: CVE Database V5
Vendor/Project: Python Software Foundation
Product: CPython

Description

User-controlled data URLs parsed by urllib.request.DataHandler allow injecting headers through newlines in the data URL mediatype.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 18:32:30 UTC

Technical Analysis

CVE-2025-15282 is a vulnerability identified in the Python Software Foundation's CPython interpreter, specifically affecting the urllib.request.DataHandler module. The issue arises from the way user-controlled data URLs are parsed: the media type portion of the data URL can contain newline characters, which are not properly sanitized or neutralized. This allows an attacker to inject arbitrary HTTP headers by embedding CRLF (carriage return and line feed) sequences within the media type string. Such injection can lead to HTTP response splitting or other header injection attacks, potentially enabling cache poisoning, cross-site scripting (XSS), or session fixation attacks depending on the context in which the headers are used. The vulnerability is categorized under CWE-93, which deals with improper neutralization of CRLF sequences in HTTP headers. The affected versions include all CPython releases from 0 through 3.15.0a1, indicating a long-standing issue that spans multiple major releases. The CVSS 4.0 base score is 6.0 (medium severity), reflecting that the attack vector is network-based with low complexity, requires partial privileges, no user interaction, and results in high impact on integrity but no impact on confidentiality or availability. No known exploits have been reported in the wild as of the published date. The vulnerability was reserved late December 2025 and published in January 2026. No official patches or fixes are linked yet, so users must monitor Python releases for updates. This vulnerability is particularly relevant for applications that rely on urllib.request to process untrusted or user-supplied data URLs, such as web scrapers, API clients, or web frameworks embedding Python.

Potential Impact

The primary impact of CVE-2025-15282 is the potential for HTTP header injection via maliciously crafted data URLs, which can lead to HTTP response splitting attacks. This can allow attackers to manipulate HTTP responses, potentially enabling cache poisoning, cross-site scripting (XSS), or session fixation attacks, thereby compromising the integrity of web communications. Organizations using vulnerable CPython versions in web-facing applications or services that parse user-supplied data URLs are at risk of these attacks. The vulnerability does not directly affect confidentiality or availability but can indirectly facilitate further attacks that compromise user data or application behavior. Given Python's widespread use in web development, automation, and data processing, this vulnerability could affect a broad range of industries including technology, finance, healthcare, and government. The requirement for partial privileges (authentication) limits exploitation somewhat but does not eliminate risk, especially in multi-user or shared environments. The absence of known exploits in the wild reduces immediate risk but does not preclude future exploitation once details become widely known.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict input validation and sanitization on any user-supplied data URLs processed by urllib.request.DataHandler. Specifically, reject or sanitize newline (CRLF) characters in the media type portion of data URLs to prevent header injection. Review and harden any code that constructs or parses data URLs, ensuring that untrusted input cannot influence HTTP headers. Employ web application firewalls (WAFs) or intrusion detection systems (IDS) to detect and block suspicious HTTP header injection attempts. Monitor Python Software Foundation announcements and promptly apply security updates once patches addressing CVE-2025-15282 are available. Consider isolating or sandboxing components that process untrusted URLs to limit the impact of potential exploitation. Additionally, conduct code audits and penetration testing focused on HTTP header injection vectors in applications using affected Python versions. Educate developers about the risks of improper input handling in URL parsing to prevent similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
PSF
Date Reserved
2025-12-29T21:04:54.816Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696ff8c24623b1157c513cfb

Added to database: 1/20/2026, 9:50:58 PM

Last enriched: 3/3/2026, 6:32:30 PM

Last updated: 3/25/2026, 2:28:12 AM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses