Vulnerability Description
When using http.cookies.Morsel, user-controlled cookie values and parameters can allow injecting HTTP headers into messages. Patch rejects all control characters within cookie names, values, and parameters.
Related Weaknesses (CWE)
References
- https://github.com/python/cpython/commit/62700107418eb2cca3fc88da036a243ea975f17
- https://github.com/python/cpython/commit/712452e6f1d4b9f7f8c4c92ebfcaac1705faa44
- https://github.com/python/cpython/commit/7852d72b653fea0199acf5fc2a84f6f8b84eba8
- https://github.com/python/cpython/commit/918387e4912d12ffc166c8f2a38df92b6ec756c
- https://github.com/python/cpython/commit/95746b3a13a985787ef53b977129041971ed7f7
- https://github.com/python/cpython/commit/b1869ff648bbee0717221d09e6deff46617f3e8
- https://github.com/python/cpython/issues/143919
- https://github.com/python/cpython/pull/143920
- https://mail.python.org/archives/list/[email protected]/thread/6VFLQQ
FAQ
What is CVE-2026-0672?
CVE-2026-0672 is a documented vulnerability. When using http.cookies.Morsel, user-controlled cookie values and parameters can allow injecting HTTP headers into messages. Patch rejects all control characters within cookie names, values, and param...
How severe is CVE-2026-0672?
CVSS scoring is not yet available for CVE-2026-0672. Check NVD for updates.
Is there a patch for CVE-2026-0672?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.