Skip to content

requests-2.32.5-py3-none-any.whl: 1 vulnerabilities (highest severity is: 4.4) [trunk] (reachable) #206

@renovate

Description

@renovate
📂 Vulnerable Library - requests-2.32.5-py3-none-any.whl

Python HTTP for Humans.

Library home page: https://files.pythonhosted.org/packages/1e/db/4254e3eabe8020b458f1a747140d32277ec7a271daf1d235b70dc0b4e6e3/requests-2.32.5-py3-none-any.whl

Path to dependency file: /src/Core/DevOps/Locust/requirements.txt

Path to vulnerable library: /tmp/ws-ua_20260411072222_HCTYLP/python_OGJROI/202604110722231/env/lib/python3.9/site-packages/requests-2.32.5.dist-info

Findings

Finding Severity 🎯 CVSS Exploit Maturity EPSS Library Type Fixed in Remediation Available Reachability
CVE-2026-25645 🟠 Medium 4.4 Not Defined < 1% requests-2.32.5-py3-none-any.whl Direct https://github.com/psf/requests.git - v2.33.0 Reachable

Details

🟠CVE-2026-25645

Vulnerable Library - requests-2.32.5-py3-none-any.whl

Python HTTP for Humans.

Library home page: https://files.pythonhosted.org/packages/1e/db/4254e3eabe8020b458f1a747140d32277ec7a271daf1d235b70dc0b4e6e3/requests-2.32.5-py3-none-any.whl

Path to dependency file: /src/Core/DevOps/Locust/requirements.txt

Path to vulnerable library: /tmp/ws-ua_20260411072222_HCTYLP/python_OGJROI/202604110722231/env/lib/python3.9/site-packages/requests-2.32.5.dist-info

Dependency Hierarchy:

  • requests-2.32.5-py3-none-any.whl (Vulnerable Library)

Reachability Analysis

This vulnerability is potentially reachable:

- shopware/src/Core/DevOps/Locust/common/context.py (Application)
    - requests-2.32.5/requests/__init__.py (Extension)
        - requests-2.32.5/requests/models.py (Extension)
            -> ❌ requests-2.32.5/requests/hooks.py (Vulnerable Component)

Vulnerability Details

Requests is a HTTP library. Prior to version 2.33.0, the "requests.utils.extract_zipped_paths()" utility function uses a predictable filename when extracting files from zip archives into the system temporary directory. If the target file already exists, it is reused without validation. A local attacker with write access to the temp directory could pre-create a malicious file that would be loaded in place of the legitimate one. Standard usage of the Requests library is not affected by this vulnerability. Only applications that call "extract_zipped_paths()" directly are impacted. Starting in version 2.33.0, the library extracts files to a non-deterministic location. If developers are unable to upgrade, they can set "TMPDIR" in their environment to a directory with restricted write access.

Publish Date: Mar 25, 2026 05:02 PM

URL: CVE-2026-25645

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 4.4


Suggested Fix

Type: Upgrade version

Origin: psf/requests@66d21cb

Release Date: Mar 25, 2026 05:02 PM

Fix Resolution : https://github.com/psf/requests.git - v2.33.0

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions