Skip to content

CVE-2026-44431 (Medium) detected in urllib3-2.6.3-py3-none-any.whl #17

@mend-bolt-for-github

Description

@mend-bolt-for-github

CVE-2026-44431 - Medium Severity Vulnerability

Vulnerable Library - urllib3-2.6.3-py3-none-any.whl

HTTP library with thread-safe connection pooling, file post, and more.

Library home page: https://files.pythonhosted.org/packages/39/08/aaaad47bc4e9dc8c725e68f9d04865dbcb2052843ff09c97b08904852d84/urllib3-2.6.3-py3-none-any.whl

Path to dependency file: /requirements.txt

Path to vulnerable library: /tmp/ws-ua_20260402140528_BYRDYW/python_TYRXAX/20260402140530/urllib3-2.6.3-py3-none-any.whl,/tmp/ws-ua_20260402140528_BYRDYW/python_TYRXAX/20260402140530/urllib3-2.6.3-py3-none-any.whl

Dependency Hierarchy:

  • urllib3-2.6.3-py3-none-any.whl (Vulnerable Library)

Found in HEAD commit: 733821ba208032bbe0d8b2992a2e4aece4265119

Found in base branch: main

Vulnerability Details

Impact When following cross-origin redirects for requests made using urllib3’s high-level APIs, such as "urllib3.request()", "PoolManager.request()", and "ProxyManager.request()", sensitive headers — "Authorization", "Cookie", and "Proxy-Authorization" (defined in "Retry.DEFAULT_REMOVE_HEADERS_ON_REDIRECT") — are stripped by default, as expected. However, cross-origin redirects followed from the low-level API via "ProxyManager.connection_from_url().urlopen(..., assert_same_host=False)" still forward these sensitive headers. Affected usage Applications and libraries using urllib3 versions earlier than 2.7.0 may be affected if they allow cross-origin redirects while making requests through "HTTPConnection.urlopen()" instances created via "ProxyManager.connection_from_url()". Remediation Upgrade to urllib3 version 2.7.0 or later, in which sensitive headers are stripped from redirects followed by "HTTPConnection". If upgrading is not immediately possible, avoid using this low-level redirect flow for cross-origin redirects. If appropriate for your use case, switch to "ProxyManager.request()".

Publish Date: 2026-05-11

URL: CVE-2026-44431

CVSS 3 Score Details (5.9)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-qccp-gfcp-xxvc

Release Date: 2026-05-11

Fix Resolution: urllib3 - 2.7.0,urllib3 - 2.7.0


Step up your Open Source Security Game with Mend here

Metadata

Metadata

Assignees

No one assigned

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions