First published: Thu Jan 23 2025(Updated: )
### Impact Via a type confusion bug in the CPython interpreter when using `try/except*` RestrictedPython could be bypassed. We believe this should be fixed upstream in Python itself until that we remove support for `try/except*` from RestrictedPython. (It has been fixed for some Python versions.) ### Patches Patched in version 8.0 by removing support for `try/except*` clauses ### Workarounds There is no workaround. ### References none
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/RestrictedPython | >=6.0<8.0 | 8.0 |
RestrictedPython | >6.0<8.0 | |
CPython | >=3.11<3.13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-22153 is categorized as a medium severity vulnerability due to the potential for type confusion in the CPython interpreter.
To fix CVE-2025-22153, you should upgrade RestrictedPython to a version above 8.0 or remove support for 'try/except*' from RestrictedPython until an official patch is released.
CVE-2025-22153 affects RestrictedPython versions between 6.0 and 8.0.
CVE-2025-22153 impacts CPython versions from 3.11 to 3.13.2.
RestrictedPython is a Python library designed to safely execute untrusted Python code.