Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1795: Vulnerability in Python Software Foundation CPython

0
Low
VulnerabilityCVE-2025-1795cvecve-2025-1795
Published: Fri Feb 28 2025 (02/28/2025, 18:59:31 UTC)
Source: CVE Database V5
Vendor/Project: Python Software Foundation
Product: CPython

Description

During an address list folding when a separating comma ends up on a folded line and that line is to be unicode-encoded then the separator itself is also unicode-encoded. Expected behavior is that the separating comma remains a plan comma. This can result in the address header being misinterpreted by some mail servers.

AI-Powered Analysis

AILast updated: 12/01/2025, 19:20:01 UTC

Technical Analysis

CVE-2025-1795 is a vulnerability identified in the Python Software Foundation's CPython interpreter, specifically affecting versions 3.10.0 through 3.13.0a1. The issue arises during the processing of email address headers when address list folding occurs. According to email standards, long address lists can be folded across multiple lines with a separating comma. The vulnerability occurs when the separating comma is placed at the end of a folded line and that line undergoes unicode encoding. Instead of preserving the comma as a plain ASCII character, the comma itself is unicode-encoded. This behavior deviates from expected standards and causes some mail servers to misinterpret the address header, potentially leading to incorrect parsing or rejection of emails. The underlying weakness relates to improper neutralization of CRLF sequences or improper encoding (CWE-116). The CVSS 4.0 vector rates this vulnerability as low severity (score 2.3) due to its limited impact on confidentiality, integrity, and availability. Exploitation requires network access with partial authentication and low privileges, and no user interaction is necessary. There are no known exploits in the wild at this time, and no patches have been linked yet. The vulnerability primarily affects email processing components that rely on CPython for parsing or generating email headers, which may cause operational issues in mail delivery or filtering systems.

Potential Impact

For European organizations, the primary impact of CVE-2025-1795 lies in the potential disruption of email processing workflows. Organizations that use CPython-based applications or libraries for email handling—such as automated mail servers, spam filters, or email clients—may experience misinterpretation of address headers, leading to failed mail delivery, incorrect routing, or rejection by downstream mail servers. While this does not directly compromise system confidentiality, integrity, or availability, it can degrade communication reliability and operational efficiency. Sectors heavily reliant on automated email processing, including finance, government, and critical infrastructure in Europe, could face increased support costs and delays. However, since exploitation does not lead to code execution or data leakage, the overall security risk remains low. The lack of known exploits and the requirement for partial authentication further reduce the likelihood of widespread impact. Nevertheless, organizations should monitor mail system behavior and be prepared to apply fixes once available to avoid operational disruptions.

Mitigation Recommendations

To mitigate CVE-2025-1795, European organizations should: 1) Monitor official Python Software Foundation channels for patches or updates addressing this vulnerability and apply them promptly once released. 2) Review and test email processing components that rely on CPython, particularly those handling address list folding and unicode encoding, to identify any abnormal mail parsing or delivery issues. 3) Implement additional validation and sanitization of email headers in custom applications to ensure compliance with RFC standards and prevent malformed headers from causing downstream issues. 4) Where feasible, isolate or sandbox email processing services to limit the impact of malformed headers on broader systems. 5) Maintain robust logging and alerting on mail server errors related to header parsing to detect potential exploitation attempts or operational anomalies early. 6) Educate development and operations teams about this specific encoding issue to avoid introducing similar bugs in custom code. These targeted actions go beyond generic advice by focusing on the specific encoding and folding behavior that triggers the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
PSF
Date Reserved
2025-02-28T18:49:37.957Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6908cdd1bdcf00867c4fc65b

Added to database: 11/3/2025, 3:44:17 PM

Last enriched: 12/1/2025, 7:20:01 PM

Last updated: 12/20/2025, 10:33:36 AM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats