CVE-2025-15282
Header injection via newlines in data URL mediatype
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
User-controlled data URLs parsed by urllib.request.DataHandler allow injecting headers through newlines in the data URL mediatype.
| CWE | CWE-93 |
| Vendor | python software foundation |
| Product | cpython |
| Published | Jan 20, 2026 |
| Last Updated | Mar 3, 2026 |
Stay Ahead of the Next One
Get instant alerts for python software foundation cpython
Be the first to know when new unknown vulnerabilities affecting python software foundation cpython are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Python Software Foundation / CPython
0 < 3.10.20 3.11.0 < 3.11.15 3.12.0 < 3.12.13 3.13.0 < 3.13.12 3.14.0 < 3.14.3 3.15.0a1 < 3.15.0a6
References
github.com: https://github.com/python/cpython/pull/143926 github.com: https://github.com/python/cpython/issues/143925 mail.python.org: https://mail.python.org/archives/list/[email protected]/thread/X66HL7SISGJT33J53OHXMZT4DFLMHVKF/ github.com: https://github.com/python/cpython/commit/f25509e78e8be6ea73c811ac2b8c928c28841b9f github.com: https://github.com/python/cpython/commit/05356b1cc153108aaf27f3b72ce438af4aa218c0 github.com: https://github.com/python/cpython/commit/34d76b00dabde81a793bd06dd8ecb057838c4b38 github.com: https://github.com/python/cpython/commit/3f396ca9d7bbe2a50ea6b8c9b27c0082884d9f80 github.com: https://github.com/python/cpython/commit/4ed11d3cd288e6b90196a15c5a825a45d318fe47 github.com: https://github.com/python/cpython/commit/a35ca3be5842505dab74dc0b90b89cde0405017a
Credits
๐ Omar M. Hasan