Kludex Python-Multipart vulnerabilities

4 known vulnerabilities affecting kludex/python-multipart.

Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH3MEDIUM1

Vulnerabilities

Page 1 of 1
CVE-2026-40347MEDIUMCVSS 5.3fixed in 0.0.262026-04-18
CVE-2026-40347 [MEDIUM] CWE-400 CVE-2026-40347: Python-Multipart is a streaming multipart parser for Python. Versions prior to 0.0.26 have a denial Python-Multipart is a streaming multipart parser for Python. Versions prior to 0.0.26 have a denial of service vulnerability when parsing crafted `multipart/form-data` requests with large preamble or epilogue sections. Upgrade to version 0.0.26 or later, which skips ahead to the next boundary candidate when processing leading CR/LF data and immediate
ghsanvd
CVE-2026-24486HIGHCVSS 7.5fixed in 0.0.222026-01-27
CVE-2026-24486 [HIGH] CWE-22 CVE-2026-24486: Python-Multipart is a streaming multipart parser for Python. Prior to version 0.0.22, a Path Travers Python-Multipart is a streaming multipart parser for Python. Prior to version 0.0.22, a Path Traversal vulnerability exists when using non-default configuration options `UPLOAD_DIR` and `UPLOAD_KEEP_FILENAME=True`. An attacker can write uploaded files to arbitrary locations on the filesystem by crafting a malicious filename. Users should upgrade to ver
ghsanvdosv
CVE-2024-53981HIGHCVSS 7.5fixed in 0.0.182024-12-02
CVE-2024-53981 [HIGH] CWE-770 CVE-2024-53981: python-multipart is a streaming multipart parser for Python. When parsing form data, python-multipar python-multipart is a streaming multipart parser for Python. When parsing form data, python-multipart skips line breaks (CR \r or LF \n) in front of the first boundary and any tailing bytes after the last boundary. This happens one byte at a time and emits a log event each time, which may cause excessive logging for certain inputs. An attacker could a
ghsanvdosv
CVE-2024-24762HIGHCVSS 7.5fixed in 0.0.72024-02-05
CVE-2024-24762 [HIGH] CWE-400 CVE-2024-24762: `python-multipart` is a streaming multipart parser for Python. When using form data, `python-multipa `python-multipart` is a streaming multipart parser for Python. When using form data, `python-multipart` uses a Regular Expression to parse the HTTP `Content-Type` header, including options. An attacker could send a custom-made `Content-Type` option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minu
ghsanvdosv