Source: requests
Version: 2.32.5+dfsg-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for requests.

CVE-2026-25645[0]:
| Requests is a HTTP library. Prior to version 2.33.0, the
| `requests.utils.extract_zipped_paths()` utility function uses a
| predictable filename when extracting files from zip archives into
| the system temporary directory. If the target file already exists,
| it is reused without validation. A local attacker with write access
| to the temp directory could pre-create a malicious file that would
| be loaded in place of the legitimate one. Standard usage of the
| Requests library is not affected by this vulnerability. Only
| applications that call `extract_zipped_paths()` directly are
| impacted. Starting in version 2.33.0, the library extracts files to
| a non-deterministic location. If developers are unable to upgrade,
| they can set `TMPDIR` in their environment to a directory with
| restricted write access.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-25645
    https://www.cve.org/CVERecord?id=CVE-2026-25645
[1] https://github.com/psf/requests/security/advisories/GHSA-gc5v-m9x4-r6x2
[2] 
https://github.com/psf/requests/commit/66d21cb07bd6255b1280291c4fafb71803cdb3b7

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to