First published: Fri Jan 31 2025(Updated: )
Last updated 20 February 2025
Credit: cna@python.org
Affected Software | Affected Version | How to fix |
---|---|---|
CPython | ||
debian/pypy3 | <=7.3.5+dfsg-2+deb11u2<=7.3.5+dfsg-2+deb11u4<=7.3.11+dfsg-2+deb12u3 | 7.3.18+dfsg-2 7.3.19+dfsg-1 |
debian/python3.11 | <=3.11.2-6+deb12u5<=3.11.2-6+deb12u3 | |
debian/python3.12 | 3.12.9-1 | |
debian/python3.13 | 3.13.2-1 | |
debian/python3.9 | <=3.9.2-1<=3.9.2-1+deb11u2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0938 has been classified as a medium severity vulnerability due to potential denial of service risks associated with invalid URL parsing.
To fix CVE-2025-0938, update to the latest version of Python where the vulnerability has been addressed.
CVE-2025-0938 affects the standard library functions of Python, specifically in the urllib.parse module.
The implications of CVE-2025-0938 include the possibility of malformed URLs causing unexpected behavior in applications relying on URL parsing.
CVE-2025-0938 can potentially lead to security issues in web applications by allowing the processing of invalid domain names.