CVE-2025-15282CRLF Injection in Software Foundation Cpython

CWE-93CRLF Injection10 documents8 sources
Severity
6.0MEDIUMNVD
OSV5.7
EPSS
0.0%
top 86.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 20
Latest updateMar 19

Description

User-controlled data URLs parsed by urllib.request.DataHandler allow injecting headers through newlines in the data URL mediatype.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:L/SA:N

Affected Packages1 packages

CVEListV5python_software_foundation/cpython3.11.03.11.15+5

🔴Vulnerability Details

4
OSV
python2.7 vulnerabilities2026-03-19
GHSA
GHSA-6rv6-r2f2-gqrc: User-controlled data URLs parsed by urllib2026-01-21
OSV
CVE-2025-15282: User-controlled data URLs parsed by urllib2026-01-20
CVEList
Header injection via newlines in data URL mediatype2026-01-20

📋Vendor Advisories

4
Ubuntu
Python 2.7 vulnerabilities2026-03-19
Ubuntu
Python vulnerabilities2026-02-05
Red Hat
cpython: Header injection via newlines in data URL mediatype in Python2026-01-20
Debian
CVE-2025-15282: pypy3 - User-controlled data URLs parsed by urllib.request.DataHandler allow injecting h...2025

🕵️Threat Intelligence

1
Wiz
CVE-2025-15282 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2025-15282 — CRLF Injection | cvebase