Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25480: CWE-176: Improper Handling of Unicode Encoding in litestar-org litestar

0
Medium
VulnerabilityCVE-2026-25480cvecve-2026-25480cwe-176
Published: Mon Feb 09 2026 (02/09/2026, 18:49:34 UTC)
Source: CVE Database V5
Vendor/Project: litestar-org
Product: litestar

Description

CVE-2026-25480 is a medium severity vulnerability in the litestar ASGI framework versions prior to 2. 20. 0. It arises from improper handling of Unicode normalization in the FileStore cache backend, leading to cache key collisions. An unauthenticated remote attacker can exploit this by crafting specific URL paths that cause one URL to serve cached responses intended for another, resulting in cache poisoning or response mixups. This can lead to information disclosure and integrity issues without requiring authentication or user interaction. The vulnerability is fixed in litestar version 2. 20. 0. European organizations using vulnerable litestar versions in web applications with FileStore caching should prioritize upgrading to mitigate risks.

AI-Powered Analysis

AILast updated: 02/09/2026, 19:47:43 UTC

Technical Analysis

CVE-2026-25480 affects the litestar asynchronous server gateway interface (ASGI) framework, specifically versions prior to 2.20.0. The vulnerability stems from the FileStore cache backend's method of mapping cache keys to filenames. FileStore uses Unicode NFKD normalization combined with ord() substitution without separators to generate filenames from cache keys. This approach can cause different Unicode inputs to normalize into identical filenames, resulting in cache key collisions. An unauthenticated remote attacker can exploit this by sending specially crafted URL paths that produce colliding cache keys. Consequently, the cache may serve a cached response from one URL when another URL is requested, effectively poisoning the cache or mixing responses. This can lead to unauthorized information disclosure and integrity violations, as users may receive incorrect or sensitive data not intended for them. The vulnerability does not require authentication or user interaction and is exploitable over the network. The flaw is categorized under CWE-176 (Improper Handling of Unicode Encoding). The issue was resolved in litestar version 2.20.0 by correcting the key-to-filename mapping to prevent collisions. No known exploits are reported in the wild as of now.

Potential Impact

For European organizations, the impact of CVE-2026-25480 can be significant if they deploy web applications using vulnerable versions of litestar with FileStore caching enabled. The primary risk is cache poisoning, where an attacker can cause users to receive cached responses intended for other URLs, potentially exposing sensitive information or causing data integrity issues. This can undermine user trust and lead to compliance violations under regulations like GDPR if personal data is inadvertently disclosed. The vulnerability's unauthenticated, network-based exploitability increases the attack surface, especially for public-facing services. While availability is not affected, confidentiality and integrity impacts can disrupt business operations and damage reputations. Organizations relying on litestar for critical services or handling sensitive data should consider this vulnerability a moderate risk that requires prompt remediation.

Mitigation Recommendations

The primary mitigation is to upgrade litestar to version 2.20.0 or later, where the vulnerability is fixed. Organizations should audit their applications to identify any use of the FileStore cache backend and confirm the litestar version in use. If immediate upgrading is not feasible, consider disabling FileStore as the response-cache backend or replacing it with an alternative caching mechanism that does not suffer from Unicode normalization issues. Implement strict input validation and normalization on URL paths to reduce the risk of crafted inputs causing collisions. Additionally, monitor cache behavior for anomalies that may indicate cache poisoning attempts. Employ web application firewalls (WAFs) with rules to detect and block suspicious URL patterns. Finally, maintain an incident response plan to quickly address any suspected exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-02T16:31:35.821Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698a36074b57a58fa16ab1e0

Added to database: 2/9/2026, 7:31:19 PM

Last enriched: 2/9/2026, 7:47:43 PM

Last updated: 2/9/2026, 8:38:55 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats