multipart is a fast multipart/form-data parser for python. Prior to 1.2.2, 1.3.1 and 1.4.0-dev, the parse_options_header() function in multipart.py uses a regular expression with an ambiguous alternation, which can cause exponential backtracking (ReDoS) when parsing maliciously crafted HTTP or multipart segment headers. This can be abused for denial of service (DoS) attacks against web applications using this library to parse request headers or multipart/form-data streams. The issue is fixed in 1.2.2, 1.3.1 and 1.4.0-dev.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6161-1 | multipart security update |
Github GHSA |
GHSA-p2m9-wcp5-6qw3 | multipart vulnerable to ReDoS in `parse_options_header()` |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Defnull
Defnull multipart |
|
| Vendors & Products |
Defnull
Defnull multipart |
Thu, 12 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | multipart is a fast multipart/form-data parser for python. Prior to 1.2.2, 1.3.1 and 1.4.0-dev, the parse_options_header() function in multipart.py uses a regular expression with an ambiguous alternation, which can cause exponential backtracking (ReDoS) when parsing maliciously crafted HTTP or multipart segment headers. This can be abused for denial of service (DoS) attacks against web applications using this library to parse request headers or multipart/form-data streams. The issue is fixed in 1.2.2, 1.3.1 and 1.4.0-dev. | |
| Title | ReDoS in multipart 1.3.0 - `parse_options_header()` | |
| Weaknesses | CWE-1333 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-12T16:45:01.070Z
Reserved: 2026-02-26T18:38:13.890Z
Link: CVE-2026-28356
No data.
Status : Awaiting Analysis
Published: 2026-03-12T17:16:50.080
Modified: 2026-03-12T21:07:53.427
Link: CVE-2026-28356
No data.
OpenCVE Enrichment
Updated: 2026-03-13T09:51:03Z
Weaknesses
Debian DSA
Github GHSA