Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25479: CWE-185: Incorrect Regular Expression in litestar-org litestar

0
Medium
VulnerabilityCVE-2026-25479cvecve-2026-25479cwe-185
Published: Mon Feb 09 2026 (02/09/2026, 18:48:19 UTC)
Source: CVE Database V5
Vendor/Project: litestar-org
Product: litestar

Description

CVE-2026-25479 is a medium-severity vulnerability in the litestar ASGI framework versions prior to 2. 20. 0. It arises from improper handling of allowlist host entries, where regex metacharacters are not escaped, allowing attackers to bypass intended hostname restrictions by supplying crafted host headers. This can lead to partial confidentiality and integrity impacts without requiring authentication or user interaction. The vulnerability is network exploitable with low attack complexity. European organizations using vulnerable litestar versions in web applications may face risks of unauthorized access or host-based filtering bypass. The issue is fixed in litestar 2. 20. 0.

AI-Powered Analysis

AILast updated: 02/09/2026, 19:47:55 UTC

Technical Analysis

CVE-2026-25479 is a vulnerability in the litestar ASGI framework, specifically in the middleware component responsible for enforcing allowed hosts via the allowlist. Prior to version 2.20.0, the allowlist entries are compiled into regular expressions without escaping regex metacharacters. This means that special characters like '.' retain their regex meaning, matching any character rather than being treated as a literal dot. Consequently, an attacker can craft a host header that matches the regex pattern but is not the intended hostname, effectively bypassing the allowed hosts restriction. This bypass can lead to unauthorized access or manipulation of host-based filtering logic, potentially allowing attackers to impersonate trusted hosts or circumvent security controls relying on host validation. The vulnerability has a CVSS 3.1 base score of 6.5 (medium severity), with network attack vector, low complexity, no privileges required, no user interaction, and impacts on confidentiality and integrity but not availability. No known exploits are currently reported in the wild. The issue is resolved in litestar version 2.20.0 by properly escaping regex metacharacters to enforce literal matching of allowlist entries.

Potential Impact

For European organizations, this vulnerability could allow attackers to bypass host-based access controls in web applications built on vulnerable litestar versions. This may lead to unauthorized access to internal services, session fixation, or host header injection attacks that compromise confidentiality and integrity of data. While availability is not impacted, the ability to spoof or bypass host restrictions can facilitate further exploitation or lateral movement within networks. Organizations relying on litestar for critical web services, especially those exposing APIs or internal dashboards, are at risk. The medium severity reflects moderate impact but ease of exploitation over the network without authentication increases the threat. Given the growing adoption of Python ASGI frameworks in Europe, especially in technology hubs and financial sectors, the vulnerability could affect a wide range of applications if not patched promptly.

Mitigation Recommendations

The primary mitigation is to upgrade all litestar deployments to version 2.20.0 or later, where the vulnerability is fixed by escaping regex metacharacters in allowlist entries. Until upgrades can be performed, organizations should audit their allowed hosts configurations to ensure no untrusted or ambiguous hostnames are permitted. Implement additional host header validation at the web server or reverse proxy level to enforce strict literal matching. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious host header patterns. Monitor logs for unusual host header values that do not correspond to legitimate hosts. Conduct penetration testing focused on host header injection and bypass attempts. Finally, maintain an inventory of applications using litestar to prioritize patching and risk assessment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-02T16:31:35.821Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698a36074b57a58fa16ab1da

Added to database: 2/9/2026, 7:31:19 PM

Last enriched: 2/9/2026, 7:47:55 PM

Last updated: 2/9/2026, 8:36:58 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats