Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-0938

Summary
Assigner-PSF
Assigner Org ID-28c92f92-d60d-412d-b760-e73465c3df22
Published At-31 Jan, 2025 | 17:51
Updated At-03 Nov, 2025 | 20:56
Rejected At-
Credits

URL parser allowed square brackets in domain names

The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accepted domain names that included square brackets which isn't valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result in differential parsing across the Python URL parser and other specification-compliant URL parsers.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:PSF
Assigner Org ID:28c92f92-d60d-412d-b760-e73465c3df22
Published At:31 Jan, 2025 | 17:51
Updated At:03 Nov, 2025 | 20:56
Rejected At:
▼CVE Numbering Authority (CNA)
URL parser allowed square brackets in domain names

The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accepted domain names that included square brackets which isn't valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result in differential parsing across the Python URL parser and other specification-compliant URL parsers.

Affected Products
Vendor
Python Software FoundationPython Software Foundation
Product
CPython
Repo
https://github.com/python/cpython
Default Status
unaffected
Versions
Affected
  • From 0 before 3.9.22 (python)
  • From 3.10.0 before 3.10.17 (python)
  • From 3.11.0 before 3.11.12 (python)
  • From 3.12.0 before 3.12.9 (python)
  • From 3.13.0 before 3.13.2 (python)
  • From 3.14.0a1 before 3.14.0a5 (python)
Problem Types
TypeCWE IDDescription
CWECWE-20CWE-20 Improper Input Validation
Type: CWE
CWE ID: CWE-20
Description: CWE-20 Improper Input Validation
Metrics
VersionBase scoreBase severityVector
4.06.3MEDIUM
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N
Version: 4.0
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/python/cpython/issues/105704
issue-tracking
https://github.com/python/cpython/pull/129418
patch
https://mail.python.org/archives/list/security-announce@python.org/thread/K4EUG6EKV6JYFIC24BASYOZS4M5XOQIB/
vendor-advisory
https://github.com/python/cpython/commit/d89a5f6a6e65511a5f6e0618c4c30a7aa5aba56a
patch
https://github.com/python/cpython/commit/90e526ae67b172ed7c6c56e7edad36263b0f9403
patch
https://github.com/python/cpython/commit/a7084f6075c9595ba60119ce8c62f1496f50c568
patch
https://github.com/python/cpython/commit/526617ed68cde460236c973e5d0a8bad4de896ba
patch
https://github.com/python/cpython/commit/b8b4b713c5f8ec0958c7ef8d29d6711889bc94ab
patch
https://github.com/python/cpython/commit/ff4e5c25666f63544071a6b075ae8b25c98b7a32
patch
Hyperlink: https://github.com/python/cpython/issues/105704
Resource:
issue-tracking
Hyperlink: https://github.com/python/cpython/pull/129418
Resource:
patch
Hyperlink: https://mail.python.org/archives/list/security-announce@python.org/thread/K4EUG6EKV6JYFIC24BASYOZS4M5XOQIB/
Resource:
vendor-advisory
Hyperlink: https://github.com/python/cpython/commit/d89a5f6a6e65511a5f6e0618c4c30a7aa5aba56a
Resource:
patch
Hyperlink: https://github.com/python/cpython/commit/90e526ae67b172ed7c6c56e7edad36263b0f9403
Resource:
patch
Hyperlink: https://github.com/python/cpython/commit/a7084f6075c9595ba60119ce8c62f1496f50c568
Resource:
patch
Hyperlink: https://github.com/python/cpython/commit/526617ed68cde460236c973e5d0a8bad4de896ba
Resource:
patch
Hyperlink: https://github.com/python/cpython/commit/b8b4b713c5f8ec0958c7ef8d29d6711889bc94ab
Resource:
patch
Hyperlink: https://github.com/python/cpython/commit/ff4e5c25666f63544071a6b075ae8b25c98b7a32
Resource:
patch
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://security.netapp.com/advisory/ntap-20250314-0002/
N/A
https://lists.debian.org/debian-lts-announce/2025/03/msg00013.html
N/A
Hyperlink: https://security.netapp.com/advisory/ntap-20250314-0002/
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/03/msg00013.html
Resource: N/A
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cna@python.org
Published At:31 Jan, 2025 | 18:15
Updated At:03 Nov, 2025 | 21:18

The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accepted domain names that included square brackets which isn't valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result in differential parsing across the Python URL parser and other specification-compliant URL parsers.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.06.3MEDIUM
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 4.0
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-20Secondarycna@python.org
CWE ID: CWE-20
Type: Secondary
Source: cna@python.org
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/python/cpython/commit/526617ed68cde460236c973e5d0a8bad4de896bacna@python.org
N/A
https://github.com/python/cpython/commit/90e526ae67b172ed7c6c56e7edad36263b0f9403cna@python.org
N/A
https://github.com/python/cpython/commit/a7084f6075c9595ba60119ce8c62f1496f50c568cna@python.org
N/A
https://github.com/python/cpython/commit/b8b4b713c5f8ec0958c7ef8d29d6711889bc94abcna@python.org
N/A
https://github.com/python/cpython/commit/d89a5f6a6e65511a5f6e0618c4c30a7aa5aba56acna@python.org
N/A
https://github.com/python/cpython/commit/ff4e5c25666f63544071a6b075ae8b25c98b7a32cna@python.org
N/A
https://github.com/python/cpython/issues/105704cna@python.org
N/A
https://github.com/python/cpython/pull/129418cna@python.org
N/A
https://mail.python.org/archives/list/security-announce@python.org/thread/K4EUG6EKV6JYFIC24BASYOZS4M5XOQIB/cna@python.org
N/A
https://lists.debian.org/debian-lts-announce/2025/03/msg00013.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://security.netapp.com/advisory/ntap-20250314-0002/af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: https://github.com/python/cpython/commit/526617ed68cde460236c973e5d0a8bad4de896ba
Source: cna@python.org
Resource: N/A
Hyperlink: https://github.com/python/cpython/commit/90e526ae67b172ed7c6c56e7edad36263b0f9403
Source: cna@python.org
Resource: N/A
Hyperlink: https://github.com/python/cpython/commit/a7084f6075c9595ba60119ce8c62f1496f50c568
Source: cna@python.org
Resource: N/A
Hyperlink: https://github.com/python/cpython/commit/b8b4b713c5f8ec0958c7ef8d29d6711889bc94ab
Source: cna@python.org
Resource: N/A
Hyperlink: https://github.com/python/cpython/commit/d89a5f6a6e65511a5f6e0618c4c30a7aa5aba56a
Source: cna@python.org
Resource: N/A
Hyperlink: https://github.com/python/cpython/commit/ff4e5c25666f63544071a6b075ae8b25c98b7a32
Source: cna@python.org
Resource: N/A
Hyperlink: https://github.com/python/cpython/issues/105704
Source: cna@python.org
Resource: N/A
Hyperlink: https://github.com/python/cpython/pull/129418
Source: cna@python.org
Resource: N/A
Hyperlink: https://mail.python.org/archives/list/security-announce@python.org/thread/K4EUG6EKV6JYFIC24BASYOZS4M5XOQIB/
Source: cna@python.org
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/03/msg00013.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://security.netapp.com/advisory/ntap-20250314-0002/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found