CVE-2025-15367
Unknown Unknown - Not Provided
Command Injection via Newlines in Python poplib Module

Publication date: 2026-01-20

Last updated on: 2026-01-20

Assigner: Python Software Foundation

Description
The poplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-20
Last Modified
2026-01-20
Generated
2026-05-07
AI Q&A
2026-01-21
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
python python From 3.13.1 (inc) to 3.13.11 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in the poplib module allows an attacker to inject additional commands by including newline characters in a user-controlled command. This means that if an attacker can control the input to the poplib module, they can insert extra commands that the module will execute. The mitigation involves rejecting commands that contain control characters to prevent this injection.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to execute unintended commands within the poplib module by injecting additional commands through newline characters. This could lead to unauthorized actions or manipulation of the system using the poplib module, potentially compromising the integrity or behavior of applications relying on it.


What immediate steps should I take to mitigate this vulnerability?

Mitigation involves rejecting commands containing control characters to prevent command injection via newlines in the poplib module.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart