Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0865: CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in Python Software Foundation CPython

0
Medium
VulnerabilityCVE-2026-0865cvecve-2026-0865cwe-74
Published: Tue Jan 20 2026 (01/20/2026, 21:26:15 UTC)
Source: CVE Database V5
Vendor/Project: Python Software Foundation
Product: CPython

Description

User-controlled header names and values containing newlines can allow injecting HTTP headers.

AI-Powered Analysis

AILast updated: 01/20/2026, 21:50:18 UTC

Technical Analysis

CVE-2026-0865 is a vulnerability identified in the CPython implementation maintained by the Python Software Foundation. It involves improper neutralization of special elements in output used by downstream components, specifically HTTP headers, classified under CWE-74. The vulnerability arises when user-controlled HTTP header names or values include newline characters, which are not properly sanitized or validated. This flaw allows an attacker with high privileges (PR:H) to inject arbitrary HTTP headers into requests or responses, potentially manipulating how downstream components interpret or process these headers. The CVSS 4.0 base score is 5.9 (medium), reflecting network attack vector (AV:N), low attack complexity (AC:L), required privileges (AT:P), no user interaction (UI:N), and partial impacts on confidentiality and integrity (VC:N, VI:H). The vulnerability does not affect availability and does not require authentication beyond high privileges. No known exploits have been reported in the wild, and no patches are currently linked, indicating it may be a recently disclosed issue. The vulnerability could be exploited in environments where Python-based web servers or applications accept and process HTTP headers from users or other systems without adequate sanitization, enabling header injection attacks that could lead to HTTP response splitting, cache poisoning, or other downstream impacts. This vulnerability highlights the importance of strict input validation and output encoding in HTTP header processing within Python applications.

Potential Impact

For European organizations, the impact of CVE-2026-0865 depends largely on the deployment of CPython in web-facing services or internal applications that handle HTTP headers. Successful exploitation could allow attackers with elevated privileges to manipulate HTTP headers, potentially leading to HTTP response splitting, cache poisoning, or bypassing security controls that rely on header integrity. This can compromise confidentiality and integrity of communications and may facilitate further attacks such as session hijacking or cross-site scripting in web applications. Organizations in sectors such as finance, healthcare, and critical infrastructure that use Python extensively for backend services could face increased risk. The requirement for high privileges limits the threat to insider threats or attackers who have already gained elevated access, reducing the likelihood of widespread exploitation. However, the complexity of modern web architectures means that even internal header injection can have cascading effects on security and data integrity. European entities with stringent data protection regulations (e.g., GDPR) must consider the potential compliance implications if this vulnerability leads to data breaches or unauthorized data manipulation.

Mitigation Recommendations

To mitigate CVE-2026-0865, European organizations should implement strict input validation and sanitization for all HTTP header names and values, explicitly disallowing newline characters and other control characters that could enable header injection. Developers should review and harden any Python-based web frameworks or custom HTTP handling code to ensure headers are constructed safely. Employing libraries or middleware that automatically sanitize headers can reduce risk. Monitoring and logging HTTP header anomalies may help detect attempted exploitation. Organizations should track updates from the Python Software Foundation and apply security patches promptly once available. Additionally, limiting the privileges of processes handling HTTP requests reduces the attack surface. Conducting security code reviews and penetration testing focused on HTTP header injection scenarios will help identify and remediate vulnerable components. Finally, adopting a defense-in-depth approach including web application firewalls (WAFs) configured to detect and block header injection attempts can provide an additional layer of protection.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
PSF
Date Reserved
2026-01-12T16:07:56.781Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696ff53d4623b1157c50c98a

Added to database: 1/20/2026, 9:35:57 PM

Last enriched: 1/20/2026, 9:50:18 PM

Last updated: 1/21/2026, 12:09:52 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2026-0933: CWE-20 Improper Input Validation in Cloudflare Wrangler

High
VulnerabilityTue Jan 20 2026

CVE-2026-0672: CWE-93 in Python Software Foundation CPython

Medium
VulnerabilityTue Jan 20 2026

CVE-2026-21990: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

High
VulnerabilityTue Jan 20 2026

CVE-2026-21989: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

High
VulnerabilityTue Jan 20 2026

CVE-2026-21988: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

High
VulnerabilityTue Jan 20 2026

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats