Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0672: CWE-93 in Python Software Foundation CPython

0
Medium
VulnerabilityCVE-2026-0672cvecve-2026-0672cwe-93
Published: Tue Jan 20 2026 (01/20/2026, 21:52:33 UTC)
Source: CVE Database V5
Vendor/Project: Python Software Foundation
Product: CPython

Description

When using http.cookies.Morsel, user-controlled cookie values and parameters can allow injecting HTTP headers into messages. Patch rejects all control characters within cookie names, values, and parameters.

AI-Powered Analysis

AILast updated: 01/20/2026, 22:22:32 UTC

Technical Analysis

CVE-2026-0672 is a vulnerability classified under CWE-93 (Improper Neutralization of CRLF Sequences in HTTP Headers) affecting the Python Software Foundation's CPython implementation, specifically the http.cookies.Morsel class. This class is responsible for managing HTTP cookie data, including names, values, and parameters. The vulnerability arises because the Morsel class does not properly sanitize or reject control characters (such as carriage return and line feed) in cookie values and parameters. An attacker who can control cookie values can inject malicious HTTP headers by exploiting this flaw, leading to HTTP response splitting attacks. Such attacks can cause a variety of downstream issues including cache poisoning, cross-site scripting (XSS), session fixation, and other injection-based attacks that compromise the integrity and confidentiality of web communications. The CVSS 4.0 score is 6.0 (medium severity), reflecting that the attack vector is network-based with low attack complexity but requires privileges (authenticated user) and does not require user interaction. The vulnerability does not affect availability but impacts confidentiality and integrity at a high level. The patch involves rejecting all control characters in cookie names, values, and parameters, effectively neutralizing the injection vector. No known exploits are reported in the wild yet, but the vulnerability is publicly disclosed and should be addressed promptly. This vulnerability affects all versions of CPython prior to the patch and is critical for any Python-based web applications that handle HTTP cookies, especially those exposed to untrusted input.

Potential Impact

For European organizations, this vulnerability poses a significant risk to web applications developed in Python that handle HTTP cookies, particularly those that rely on the http.cookies.Morsel class for cookie management. Exploitation can lead to HTTP response splitting, enabling attackers to poison caches, inject malicious scripts, or hijack sessions, thereby compromising user data confidentiality and application integrity. This can result in data breaches, loss of user trust, regulatory non-compliance (e.g., GDPR violations), and potential financial and reputational damage. Organizations in sectors such as finance, healthcare, government, and e-commerce, which often use Python for backend services, are especially vulnerable. The medium severity rating suggests that while exploitation is feasible, it requires some level of authentication, which may limit exposure but does not eliminate risk. The lack of user interaction needed means automated attacks could be launched once access is gained. The vulnerability could also be leveraged in multi-stage attacks targeting European critical infrastructure or sensitive data repositories.

Mitigation Recommendations

European organizations should immediately update their Python environments to the latest patched CPython versions that reject control characters in cookie names, values, and parameters. If immediate patching is not feasible, implement strict input validation and sanitization on all cookie-related data, ensuring that control characters (CR, LF, and other non-printable characters) are filtered out or encoded before processing. Web application firewalls (WAFs) should be configured to detect and block HTTP response splitting attempts by monitoring for suspicious header injection patterns. Security teams should audit existing applications for use of http.cookies.Morsel and review cookie handling logic for unsafe practices. Additionally, conduct penetration testing focused on HTTP header injection vectors to identify exploitable instances. Logging and monitoring should be enhanced to detect anomalous HTTP responses that may indicate exploitation attempts. Finally, educate developers about secure cookie handling and the risks of improper input sanitization to prevent recurrence.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
PSF
Date Reserved
2026-01-07T17:08:45.326Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696ffc4f4623b1157c51a0af

Added to database: 1/20/2026, 10:06:07 PM

Last enriched: 1/20/2026, 10:22:32 PM

Last updated: 1/21/2026, 12:28:02 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2026-0933: CWE-20 Improper Input Validation in Cloudflare Wrangler

High
VulnerabilityTue Jan 20 2026

CVE-2026-21990: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

High
VulnerabilityTue Jan 20 2026

CVE-2026-21989: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

High
VulnerabilityTue Jan 20 2026

CVE-2026-21988: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

High
VulnerabilityTue Jan 20 2026

CVE-2026-21987: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

High
VulnerabilityTue Jan 20 2026

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats