Python Requests vulnerabilities
8 known vulnerabilities affecting python/requests.
Total CVEs
8
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH1MEDIUM7
Vulnerabilities
Page 1 of 1
CVE-2026-25645MEDIUMCVSS 5.5fixed in 2.33.02026-03-25
CVE-2026-25645 [MEDIUM] CWE-377 CVE-2026-25645: Requests is a HTTP library. Prior to version 2.33.0, the `requests.utils.extract_zipped_paths()` uti
Requests is a HTTP library. Prior to version 2.33.0, the `requests.utils.extract_zipped_paths()` utility function uses a predictable filename when extracting files from zip archives into the system temporary directory. If the target file already exists, it is reused without validation. A local attacker with write access to the temp directory could p
ghsanvdosv
CVE-2024-47081MEDIUMCVSS 5.3≥ 0, < 2.32.42025-06-09
CVE-2024-47081 [MEDIUM] CWE-522 Requests vulnerable to .netrc credentials leak via malicious URLs
Requests vulnerable to .netrc credentials leak via malicious URLs
### Impact
Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs.
### Workarounds
For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on your Requests Session ([docs](https://requests.readthedocs.io/e
ghsaosv
CVE-2024-35195MEDIUMCVSS 5.6≥ 0, < 2.32.02024-05-20
CVE-2024-35195 [MEDIUM] CWE-670 Requests `Session` object does not verify requests after making first request with verify=False
Requests `Session` object does not verify requests after making first request with verify=False
When using a `requests.Session`, if the first request to a given origin is made with `verify=False`, TLS certificate verification may remain disabled for all subsequent requests to that origin, even if `verify=True` is explicitly specified later.
This occurs because the und
ghsaosv
CVE-2023-32681MEDIUMCVSS 6.1≥ 2.3.0, < 2.31.02023-05-26
CVE-2023-32681 [MEDIUM] CWE-200 CVE-2023-32681: Requests is a HTTP library. Since Requests 2.3.0, Requests has been leaking Proxy-Authorization head
Requests is a HTTP library. Since Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to destination servers when redirected to an HTTPS endpoint. This is a product of how we use `rebuild_proxies` to reattach the `Proxy-Authorization` header to requests. For HTTP connections sent through the tunnel, the proxy will identify the head
ghsanvdosv
CVE-2018-18074HIGHCVSS 7.5fixed in 2.20.02018-10-09
CVE-2018-18074 [HIGH] CWE-522 CVE-2018-18074: The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon
The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.
ghsanvdosv
CVE-2015-2296MEDIUMCVSS 6.8v2.1.0v2.2.1+9 more2015-03-18
CVE-2015-2296 [MEDIUM] CVE-2015-2296: The resolve_redirects function in sessions.py in requests 2.1.0 through 2.5.3 allows remote attacker
The resolve_redirects function in sessions.py in requests 2.1.0 through 2.5.3 allows remote attackers to conduct session fixation attacks via a cookie without a host value in a redirect.
ghsanvdosv
CVE-2014-1829MEDIUMCVSS 5.0≤ 2.2.12014-10-15
CVE-2014-1829 [MEDIUM] CWE-200 CVE-2014-1829: Requests (aka python-requests) before 2.3.0 allows remote servers to obtain a netrc password by read
Requests (aka python-requests) before 2.3.0 allows remote servers to obtain a netrc password by reading the Authorization header in a redirected request.
ghsanvdosv
CVE-2014-1830MEDIUMCVSS 5.0≤ 2.2.12014-10-15
CVE-2014-1830 [MEDIUM] CWE-200 CVE-2014-1830: Requests (aka python-requests) before 2.3.0 allows remote servers to obtain sensitive information by
Requests (aka python-requests) before 2.3.0 allows remote servers to obtain sensitive information by reading the Proxy-Authorization header in a redirected request.
ghsanvdosv