๐Ÿ” CVE Alert

CVE-2026-25645

MEDIUM 4.4

Requests has Insecure Temp File Reuse in its extract_zipped_paths() utility function

CVSS Score
4.4
EPSS Score
0.0%
EPSS Percentile
0th

Requests is a HTTP library. Prior to version 2.33.0, the `requests.utils.extract_zipped_paths()` utility function uses a predictable filename when extracting files from zip archives into the system temporary directory. If the target file already exists, it is reused without validation. A local attacker with write access to the temp directory could pre-create a malicious file that would be loaded in place of the legitimate one. Standard usage of the Requests library is not affected by this vulnerability. Only applications that call `extract_zipped_paths()` directly are impacted. Starting in version 2.33.0, the library extracts files to a non-deterministic location. If developers are unable to upgrade, they can set `TMPDIR` in their environment to a directory with restricted write access.

CWE CWE-377
Vendor psf
Product requests
Published Mar 25, 2026
Last Updated Mar 25, 2026
Stay Ahead of the Next One

Get instant alerts for psf requests

Be the first to know when new medium vulnerabilities affecting psf requests are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None

Affected Versions

psf / requests
< 2.33.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/psf/requests/security/advisories/GHSA-gc5v-m9x4-r6x2 github.com: https://github.com/psf/requests/commit/66d21cb07bd6255b1280291c4fafb71803cdb3b7 github.com: https://github.com/psf/requests/releases/tag/v2.33.0