Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0865: CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in Python Software Foundation CPython

0
Medium
VulnerabilityCVE-2026-0865cvecve-2026-0865cwe-74
Published: Tue Jan 20 2026 (01/20/2026, 21:26:15 UTC)
Source: CVE Database V5
Vendor/Project: Python Software Foundation
Product: CPython

Description

User-controlled header names and values containing newlines can allow injecting HTTP headers.

AI-Powered Analysis

AILast updated: 02/04/2026, 08:22:42 UTC

Technical Analysis

CVE-2026-0865 is a vulnerability identified in the Python Software Foundation's CPython interpreter, specifically affecting versions 0 through 3.15.0a1. The issue arises from improper neutralization of special elements in output used by downstream components, classified under CWE-74 (Improper Neutralization of Special Elements in Output). The vulnerability allows an attacker to inject HTTP headers by including newline characters in user-controlled HTTP header names or values. This injection can manipulate how downstream HTTP components interpret requests or responses, potentially leading to security issues such as HTTP response splitting, cache poisoning, or session fixation. The CVSS 4.0 vector indicates the attack is network-based (AV:N), requires low attack complexity (AC:L), partial authentication (AT:P), and high privileges (PR:H), with no user interaction (UI:N). The impact affects confidentiality and integrity partially, with no effect on availability. No known exploits have been reported in the wild, and no patches are currently linked, implying that mitigation relies on input validation and cautious handling of HTTP headers in applications using affected CPython versions. This vulnerability is particularly relevant for web applications or services built on Python that process HTTP headers dynamically, as malicious header injection can compromise security controls or lead to further exploitation.

Potential Impact

For European organizations, the impact of CVE-2026-0865 can be significant in environments where CPython is used to develop or run web services that handle HTTP headers. Exploitation could allow attackers with partial authentication and high privileges to inject malicious HTTP headers, potentially enabling session hijacking, cache poisoning, or bypassing security policies enforced via headers (e.g., Content Security Policy, CORS). This could lead to data leakage, unauthorized access, or manipulation of web application behavior. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on Python-based web applications are at higher risk. The requirement for high privileges and partial authentication reduces the likelihood of widespread exploitation but does not eliminate the risk, especially in complex multi-user environments or where privilege escalation is possible. The absence of known exploits suggests limited current threat activity, but the vulnerability should be addressed proactively to prevent future attacks.

Mitigation Recommendations

1. Immediately audit all Python-based web applications and services to identify usage of affected CPython versions (0 through 3.15.0a1). 2. Implement strict input validation and sanitization for all HTTP header names and values, explicitly disallowing newline characters (CR, LF) to prevent header injection. 3. Apply the principle of least privilege to reduce the number of users or processes with high privileges that could exploit this vulnerability. 4. Monitor logs for unusual HTTP header patterns or injection attempts that could indicate exploitation attempts. 5. Stay informed about official patches or updates from the Python Software Foundation and plan prompt upgrades to fixed versions once released. 6. Employ web application firewalls (WAFs) with rules to detect and block suspicious header injection attempts. 7. Conduct security reviews of third-party Python libraries or frameworks that may process HTTP headers to ensure they are not vulnerable. 8. Educate developers about secure handling of HTTP headers and the risks of injection vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
PSF
Date Reserved
2026-01-12T16:07:56.781Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696ff53d4623b1157c50c98a

Added to database: 1/20/2026, 9:35:57 PM

Last enriched: 2/4/2026, 8:22:42 AM

Last updated: 2/7/2026, 5:47:53 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats