CVE-2025-50181
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-19

Last updated on: 2025-09-18

Assigner: GitHub, Inc.

Description
urllib3 is a user-friendly HTTP client library for Python. Prior to 2.5.0, it is possible to disable redirects for all requests by instantiating a PoolManager and specifying retries in a way that disable redirects. By default, requests and botocore users are not affected. An application attempting to mitigate SSRF or open redirect vulnerabilities by disabling redirects at the PoolManager level will remain vulnerable. This issue has been patched in version 2.5.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-19
Last Modified
2025-09-18
Generated
2026-05-07
AI Q&A
2025-06-19
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
python urllib3 to 2.5.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-601 The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in urllib3 versions prior to 2.5.0 allows an application to disable HTTP redirects globally by configuring the PoolManager with retries that disable redirects. However, this method does not effectively prevent Server-Side Request Forgery (SSRF) or open redirect attacks, meaning applications attempting to mitigate these issues by disabling redirects at the PoolManager level remain vulnerable. The issue was fixed in version 2.5.0.


How can this vulnerability impact me? :

If your application uses urllib3 versions before 2.5.0 and tries to prevent SSRF or open redirect vulnerabilities by disabling redirects at the PoolManager level, it will remain vulnerable to these attacks. This can lead to unauthorized internal network access or redirecting users to malicious sites, potentially compromising security.


What immediate steps should I take to mitigate this vulnerability?

Upgrade urllib3 to version 2.5.0 or later, where this issue has been patched. Avoid disabling redirects at the PoolManager level to prevent remaining vulnerable to SSRF or open redirect attacks.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart