Description
User-controlled header names and values containing newlines can allow injecting HTTP headers.
Published: 2026-01-20
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Header Injection
Action: Patch
AI Analysis

Impact

User-controlled HTTP header names or values that include newline characters can be used to inject additional headers into the response. This header injection vulnerability may enable attackers to modify or add HTTP headers, potentially leading to HTTP response splitting, cache poisoning, or application logic manipulation. The flaw originates from the lack of sanitization in Python's wsgiref.headers module and is classified as a Header Injection weakness (CWE‑74).

Affected Systems

The vulnerability affects the CPython implementation of the Python Software Foundation. Any deployment that employs the wsgiref.headers class without the patch—primarily Python web servers or applications that use the wsgiref module—is potentially impacted. Affected version details were not disclosed in the provided data.

Risk and Exploitability

The CVSS score of 5.9 indicates a moderate impact, while an EPSS score of less than 1% suggests a low exploitation probability at this time. The issue does not appear in the CISA KEV catalog, implying no confirmed widespread exploitation. The likely attack vector is remote, via an HTTP request constructed by an attacker that includes newlines in header names or values processed by wsgiref.headers. An attacker could construct such a request to influence the server's response headers before application logic is applied.

Generated by OpenCVE AI on April 16, 2026 at 18:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade CPython to the latest stable release that incorporates the wsgiref header sanitization change.
  • If an immediate upgrade is not possible, validate and sanitize all incoming HTTP headers for newline characters before they reach the wsgiref module, or handle headers at the application layer to prevent injection.
  • Consider disabling or replacing the use of wsgiref.headers in production code, or using a third-party WSGI server with stricter header validation.

Generated by OpenCVE AI on April 16, 2026 at 18:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4455-1 python3.9 security update
Ubuntu USN Ubuntu USN USN-8018-1 Python vulnerabilities
Ubuntu USN Ubuntu USN USN-8018-2 Python regression
Ubuntu USN Ubuntu USN USN-8018-3 Python 2.7 vulnerabilities
History

Tue, 03 Mar 2026 14:45:00 +0000


Mon, 23 Feb 2026 15:15:00 +0000


Fri, 13 Feb 2026 16:30:00 +0000


Thu, 22 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 4.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N'}

threat_severity

Moderate


Wed, 21 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 21 Jan 2026 11:30:00 +0000

Type Values Removed Values Added
First Time appeared Python
Python cpython
Vendors & Products Python
Python cpython

Tue, 20 Jan 2026 23:15:00 +0000


Tue, 20 Jan 2026 22:45:00 +0000


Tue, 20 Jan 2026 21:45:00 +0000

Type Values Removed Values Added
Description User-controlled header names and values containing newlines can allow injecting HTTP headers.
Title wsgiref.headers.Headers allows header newline injection
Weaknesses CWE-74
References
Metrics cvssV4_0

{'score': 5.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: PSF

Published:

Updated: 2026-03-03T14:43:30.596Z

Reserved: 2026-01-12T16:07:56.781Z

Link: CVE-2026-0865

cve-icon Vulnrichment

Updated: 2026-01-21T15:48:38.269Z

cve-icon NVD

Status : Deferred

Published: 2026-01-20T22:15:52.800

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0865

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-01-20T21:26:15Z

Links: CVE-2026-0865 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T18:15:43Z

Weaknesses