CVE-2026-25480: CWE-176: Improper Handling of Unicode Encoding in litestar-org litestar
CVE-2026-25480 is a medium severity vulnerability in the litestar ASGI framework versions prior to 2. 20. 0. It arises from improper handling of Unicode normalization in the FileStore cache backend, leading to cache key collisions. An unauthenticated remote attacker can exploit this by crafting specific URL paths that cause one URL to serve cached responses intended for another, resulting in cache poisoning or response mixups. This can lead to information disclosure and integrity issues without requiring authentication or user interaction. The vulnerability is fixed in litestar version 2. 20. 0. European organizations using vulnerable litestar versions in web applications with FileStore caching should prioritize upgrading to mitigate risks.
AI Analysis
Technical Summary
CVE-2026-25480 affects the litestar asynchronous server gateway interface (ASGI) framework, specifically versions prior to 2.20.0. The vulnerability stems from the FileStore cache backend's method of mapping cache keys to filenames. FileStore uses Unicode NFKD normalization combined with ord() substitution without separators to generate filenames from cache keys. This approach can cause different Unicode inputs to normalize into identical filenames, resulting in cache key collisions. An unauthenticated remote attacker can exploit this by sending specially crafted URL paths that produce colliding cache keys. Consequently, the cache may serve a cached response from one URL when another URL is requested, effectively poisoning the cache or mixing responses. This can lead to unauthorized information disclosure and integrity violations, as users may receive incorrect or sensitive data not intended for them. The vulnerability does not require authentication or user interaction and is exploitable over the network. The flaw is categorized under CWE-176 (Improper Handling of Unicode Encoding). The issue was resolved in litestar version 2.20.0 by correcting the key-to-filename mapping to prevent collisions. No known exploits are reported in the wild as of now.
Potential Impact
For European organizations, the impact of CVE-2026-25480 can be significant if they deploy web applications using vulnerable versions of litestar with FileStore caching enabled. The primary risk is cache poisoning, where an attacker can cause users to receive cached responses intended for other URLs, potentially exposing sensitive information or causing data integrity issues. This can undermine user trust and lead to compliance violations under regulations like GDPR if personal data is inadvertently disclosed. The vulnerability's unauthenticated, network-based exploitability increases the attack surface, especially for public-facing services. While availability is not affected, confidentiality and integrity impacts can disrupt business operations and damage reputations. Organizations relying on litestar for critical services or handling sensitive data should consider this vulnerability a moderate risk that requires prompt remediation.
Mitigation Recommendations
The primary mitigation is to upgrade litestar to version 2.20.0 or later, where the vulnerability is fixed. Organizations should audit their applications to identify any use of the FileStore cache backend and confirm the litestar version in use. If immediate upgrading is not feasible, consider disabling FileStore as the response-cache backend or replacing it with an alternative caching mechanism that does not suffer from Unicode normalization issues. Implement strict input validation and normalization on URL paths to reduce the risk of crafted inputs causing collisions. Additionally, monitor cache behavior for anomalies that may indicate cache poisoning attempts. Employ web application firewalls (WAFs) with rules to detect and block suspicious URL patterns. Finally, maintain an incident response plan to quickly address any suspected exploitation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland, Denmark
CVE-2026-25480: CWE-176: Improper Handling of Unicode Encoding in litestar-org litestar
Description
CVE-2026-25480 is a medium severity vulnerability in the litestar ASGI framework versions prior to 2. 20. 0. It arises from improper handling of Unicode normalization in the FileStore cache backend, leading to cache key collisions. An unauthenticated remote attacker can exploit this by crafting specific URL paths that cause one URL to serve cached responses intended for another, resulting in cache poisoning or response mixups. This can lead to information disclosure and integrity issues without requiring authentication or user interaction. The vulnerability is fixed in litestar version 2. 20. 0. European organizations using vulnerable litestar versions in web applications with FileStore caching should prioritize upgrading to mitigate risks.
AI-Powered Analysis
Technical Analysis
CVE-2026-25480 affects the litestar asynchronous server gateway interface (ASGI) framework, specifically versions prior to 2.20.0. The vulnerability stems from the FileStore cache backend's method of mapping cache keys to filenames. FileStore uses Unicode NFKD normalization combined with ord() substitution without separators to generate filenames from cache keys. This approach can cause different Unicode inputs to normalize into identical filenames, resulting in cache key collisions. An unauthenticated remote attacker can exploit this by sending specially crafted URL paths that produce colliding cache keys. Consequently, the cache may serve a cached response from one URL when another URL is requested, effectively poisoning the cache or mixing responses. This can lead to unauthorized information disclosure and integrity violations, as users may receive incorrect or sensitive data not intended for them. The vulnerability does not require authentication or user interaction and is exploitable over the network. The flaw is categorized under CWE-176 (Improper Handling of Unicode Encoding). The issue was resolved in litestar version 2.20.0 by correcting the key-to-filename mapping to prevent collisions. No known exploits are reported in the wild as of now.
Potential Impact
For European organizations, the impact of CVE-2026-25480 can be significant if they deploy web applications using vulnerable versions of litestar with FileStore caching enabled. The primary risk is cache poisoning, where an attacker can cause users to receive cached responses intended for other URLs, potentially exposing sensitive information or causing data integrity issues. This can undermine user trust and lead to compliance violations under regulations like GDPR if personal data is inadvertently disclosed. The vulnerability's unauthenticated, network-based exploitability increases the attack surface, especially for public-facing services. While availability is not affected, confidentiality and integrity impacts can disrupt business operations and damage reputations. Organizations relying on litestar for critical services or handling sensitive data should consider this vulnerability a moderate risk that requires prompt remediation.
Mitigation Recommendations
The primary mitigation is to upgrade litestar to version 2.20.0 or later, where the vulnerability is fixed. Organizations should audit their applications to identify any use of the FileStore cache backend and confirm the litestar version in use. If immediate upgrading is not feasible, consider disabling FileStore as the response-cache backend or replacing it with an alternative caching mechanism that does not suffer from Unicode normalization issues. Implement strict input validation and normalization on URL paths to reduce the risk of crafted inputs causing collisions. Additionally, monitor cache behavior for anomalies that may indicate cache poisoning attempts. Employ web application firewalls (WAFs) with rules to detect and block suspicious URL patterns. Finally, maintain an incident response plan to quickly address any suspected exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-02T16:31:35.821Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698a36074b57a58fa16ab1e0
Added to database: 2/9/2026, 7:31:19 PM
Last enriched: 2/9/2026, 7:47:43 PM
Last updated: 2/9/2026, 8:38:55 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25740: CWE-250: Execution with Unnecessary Privileges in NixOS nixpkgs
MediumCVE-2026-25528: CWE-918: Server-Side Request Forgery (SSRF) in langchain-ai langsmith-sdk
MediumCVE-2026-25498: CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') in craftcms cms
HighCVE-2026-2246: Memory Corruption in AprilRobotics apriltag
MediumCVE-2026-25497: CWE-639: Authorization Bypass Through User-Controlled Key in craftcms cms
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.