🔐 CVE Alert

CVE-2026-39807

UNKNOWN 0.0

Client-supplied URI scheme trusted without transport verification in bandit

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Reliance on Untrusted Inputs in a Security Decision vulnerability in mtrudel bandit allows unauthenticated transport-state spoofing on plaintext HTTP connections. 'Elixir.Bandit.Pipeline':determine_scheme/2 in lib/bandit/pipeline.ex returns the client-supplied URI scheme verbatim, ignoring the transport's secure? flag. HTTP/1.1 absolute-form request targets (e.g. GET https://victim/path HTTP/1.1) and the HTTP/2 :scheme pseudo-header are both attacker-controlled strings that flow through this function. Over a plaintext TCP connection, a client can declare https and Bandit will set conn.scheme = :https even though no TLS was negotiated. Downstream Plug consumers that branch on conn.scheme are silently misled: Plug.SSL's already-secure branch skips its HTTP→HTTPS redirect, cookies emitted with secure: true are sent over plaintext, audit logs record requests as having arrived over HTTPS, and CSRF/SameSite gating may make incorrect decisions. This issue affects bandit: from 1.0.0 before 1.11.0.

CWE CWE-807
Vendor mtrudel
Product bandit
Published May 1, 2026
Stay Ahead of the Next One

Get instant alerts for mtrudel bandit

Be the first to know when new unknown vulnerabilities affecting mtrudel bandit are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

mtrudel / bandit
1.0.0 < 1.11.0
mtrudel / bandit
ff2f829326cd5dcf7335939aef9775269d881e28 < 1.11.0

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/mtrudel/bandit/security/advisories/GHSA-375f-4r2h-f99j cna.erlef.org: https://cna.erlef.org/cves/CVE-2026-39807.html osv.dev: https://osv.dev/vulnerability/EEF-CVE-2026-39807 github.com: https://github.com/mtrudel/bandit/commit/45feea20dea8af7ffd7245271107b695c040e667

Credits

Peter Ullrich Mat Trudel Jonatan Männchen