Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-35536: CWE-159 Improper Handling of Invalid Use of Special Elements in tornadoweb Tornado

0
High
VulnerabilityCVE-2026-35536cvecve-2026-35536cwe-159
Published: Fri Apr 03 2026 (04/03/2026, 02:25:57 UTC)
Source: CVE Database V5
Vendor/Project: tornadoweb
Product: Tornado

Description

In Tornado before 6.5.5, cookie attribute injection could occur because the domain, path, and samesite arguments to .RequestHandler.set_cookie were not checked for crafted characters.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 03:53:18 UTC

Technical Analysis

CVE-2026-35536 is a vulnerability identified in the Tornado web framework before version 6.5.5. The issue arises from improper handling of invalid input in the set_cookie method of Tornado's RequestHandler class. Specifically, the domain, path, and samesite arguments passed to set_cookie are not properly validated or sanitized for crafted characters that could be used to inject malicious cookie attributes. This vulnerability is classified under CWE-159 (Improper Handling of Invalid Use of Special Elements), indicating that the software does not correctly handle special characters or malformed input in cookie attributes. Exploiting this flaw allows an attacker to perform cookie attribute injection, potentially altering cookie scope or behavior, which can lead to session fixation, cross-site scripting (XSS), or other session-related attacks. The CVSS v3.1 score is 7.2 (high), reflecting that the vulnerability can be exploited remotely over the network without authentication or user interaction, and it affects confidentiality and integrity with a scope change. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to applications relying on Tornado for web services. The lack of input validation on cookie parameters means attackers can craft malicious cookies that may bypass security controls or manipulate user sessions.

Potential Impact

The impact of CVE-2026-35536 is primarily on the confidentiality and integrity of web sessions managed by Tornado-based applications. By injecting crafted cookie attributes, attackers can manipulate cookie scope, potentially enabling session fixation or hijacking attacks. This can lead to unauthorized access to user accounts or sensitive data. Additionally, altered cookie attributes might facilitate cross-site scripting or cross-site request forgery attacks by influencing browser cookie handling. Since the vulnerability can be exploited remotely without authentication or user interaction, it poses a significant risk to any publicly accessible Tornado web service. Organizations relying on Tornado for critical web applications could face data breaches, loss of user trust, and regulatory compliance issues if exploited. The absence of known exploits in the wild currently limits immediate impact, but the vulnerability's nature and ease of exploitation make it a high priority for remediation.

Mitigation Recommendations

To mitigate CVE-2026-35536, organizations should upgrade Tornado to version 6.5.5 or later where this vulnerability is fixed. Until upgrading is possible, developers should implement strict input validation and sanitization on all cookie attribute parameters (domain, path, samesite) before passing them to set_cookie. This includes rejecting or encoding special characters that could be used for injection. Additionally, applying web application firewalls (WAFs) with rules to detect and block suspicious cookie attributes can provide a temporary defense. Security teams should audit existing applications for improper cookie handling and monitor logs for unusual cookie-related activity. Educating developers on secure cookie management practices and regularly reviewing third-party dependencies for updates will reduce future risks. Finally, organizations should test their applications against cookie injection scenarios to ensure resilience.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-04-03T02:25:57.035Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cf362ae6bfc5ba1d4c9702

Added to database: 4/3/2026, 3:38:18 AM

Last enriched: 4/3/2026, 3:53:18 AM

Last updated: 4/9/2026, 2:39:19 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses