https://vulnerability.cert.dk/rss/recent/pysec/10 Most recent entries from pysec 2025-08-18T00:59:57.880601+00:00 Vulnerability-Lookup cert@cert.dk python-feedgen Contains only the most 10 recent entries. https://vulnerability.cert.dk/vuln/pysec-2024-258 pysec-2024-258 2025-08-18T00:59:57.902426+00:00 In scrapy/scrapy, an issue was identified where the Authorization header is not removed during redirects that only change the scheme (e.g., HTTPS to HTTP) but remain within the same domain. This behavior contravenes the Fetch standard, which mandates the removal of Authorization headers in cross-origin requests when the scheme, host, or port changes. Consequently, when a redirect downgrades from HTTPS to HTTP, the Authorization header may be inadvertently exposed in plaintext, leading to potential sensitive information disclosure to unauthorized actors. The flaw is located in the _build_redirect_request function of the redirect middleware. https://vulnerability.cert.dk/vuln/pysec-2024-259 pysec-2024-259 2025-08-18T00:59:57.902399+00:00 In PyTorch <=2.4.1, the RemoteModule has Deserialization RCE. NOTE: this is disputed by multiple parties because this is intended behavior in PyTorch distributed computing. https://vulnerability.cert.dk/vuln/pysec-2025-70 pysec-2025-70 2025-08-18T00:59:57.902372+00:00 A Server-Side Request Forgery (SSRF) vulnerability exists in the RequestsToolkit component of the langchain-community package (specifically, langchain_community.agent_toolkits.openapi.toolkit.RequestsToolkit) in langchain-ai/langchain version 0.0.27. This vulnerability occurs because the toolkit does not enforce restrictions on requests to remote internet addresses, allowing it to also access local addresses. As a result, an attacker could exploit this flaw to perform port scans, access local services, retrieve instance metadata from cloud environments (e.g., Azure, AWS), and interact with servers on the local network. This issue has been fixed in version 0.0.28. https://vulnerability.cert.dk/vuln/pysec-2025-71 pysec-2025-71 2025-08-18T00:59:57.902343+00:00 Cadwyn creates production-ready community-driven modern Stripe-like API versioning in FastAPI. In versions before 5.4.3, the version parameter of the "/docs" endpoint is vulnerable to a Reflected XSS (Cross-Site Scripting) attack. This XSS would notably allow an attacker to execute JavaScript code on a user's session for any application based on Cadwyn via a one-click attack. The vulnerability has been fixed in version 5.4.3. https://vulnerability.cert.dk/vuln/pysec-2023-278 pysec-2023-278 2025-08-18T00:59:57.902315+00:00 MindsDB connects artificial intelligence models to real time data. Versions prior to 23.11.4.1 contain a limited file write vulnerability in `file.py` Users should use MindsDB's `staging` branch or v23.11.4.1, which contain a fix for the issue. https://vulnerability.cert.dk/vuln/pysec-2024-82 pysec-2024-82 2025-08-18T00:59:57.902287+00:00 Deserialization of untrusted data can occur in versions 23.3.2.0 and newer of the MindsDB platform, enabling a maliciously uploaded model to run arbitrary code on the server when interacted with. https://vulnerability.cert.dk/vuln/pysec-2024-83 pysec-2024-83 2025-08-18T00:59:57.902260+00:00 Deserialization of untrusted data can occur in versions 23.10.2.0 and newer of the MindsDB platform, enabling a maliciously uploaded ‘inhouse’ model to run arbitrary code on the server when used for a prediction. https://vulnerability.cert.dk/vuln/pysec-2024-84 pysec-2024-84 2025-08-18T00:59:57.902221+00:00 Deserialization of untrusted data can occur in versions 23.10.3.0 and newer of the MindsDB platform, enabling a maliciously uploaded ‘inhouse’ model to run arbitrary code on the server when a ‘describe’ query is run on it. https://vulnerability.cert.dk/vuln/pysec-2024-85 pysec-2024-85 2025-08-18T00:59:57.902164+00:00 Deserialization of untrusted data can occur in versions 23.10.2.0 and newer of the MindsDB platform, enabling a maliciously uploaded ‘inhouse’ model to run arbitrary code on the server when using ‘finetune’ on it. https://vulnerability.cert.dk/vuln/pysec-2025-72 pysec-2025-72 2025-08-18T00:59:57.885301+00:00 The `num2words` project was compromised via a phishing attack and two new versions were uploaded to PyPI containing malicious code. The affected versions have been removed from PyPI, and users are advised to remove the affected versions from their environments.