Description
When calling base64.b64decode() or related functions the decoding process would stop after encountering the first padded quad regardless of whether there was more information to be processed. This can lead to data being accepted which may be processed differently by other implementations. Use "validate=True" to enable stricter processing of base64 data.
Published: 2026-04-10
Score: 6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Data integrity issue due to truncated Base64 decoding
Action: Apply Patch
AI Analysis

Impact

When decoding Base64 data, the interpreter stops reading after the first padded quadruple, ignoring any trailing data. The result is that applications may accept malformed or malformedly padded data that other implementations would reject. This can lead to logic errors, unintended data injection, or subtle information handling discrepancies. The vulnerability is a logic flaw (CWE‑1286) and a potential misuse of unvalidated input (CWE‑345).

Affected Systems

The affected product is Python Software Foundation CPython. No specific version range is listed in the advisory, implying that any Python build using the standard base64 module during the time of the vulnerability is potentially affected.

Risk and Exploitability

The CVSS score is 6.0, indicating medium severity, while the EPSS score is below 1 %, signifying a low probability of exploitation. The vulnerability is not included in the CISA KEV catalog. Exploitation would involve supplying crafted Base64 data to an application that uses CPython’s decoding functions; the attacker would need only read or influence the decoded output, which can be readily achieved in many web or network services that decode user input.

Generated by OpenCVE AI on April 14, 2026 at 17:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade CPython to the latest release that contains the fix.
  • If an immediate upgrade is infeasible, modify any calls to base64.b64decode(), or similar functions, to use the validate=True parameter to enforce stricter decoding.
  • Verify that all components that process Base64 data check the length and content of the input before use.
  • Stay updated by consulting the Python Security mailing list and the official CPython release notes for further patches or recommendations.

Generated by OpenCVE AI on April 14, 2026 at 17:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Tue, 14 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1286
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N'}

threat_severity

Moderate


Mon, 13 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-345
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Python
Python cpython
Vendors & Products Python
Python cpython

Fri, 10 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
Description When calling base64.b64decode() or related functions the decoding process would stop after encountering the first padded quad regardless of whether there was more information to be processed. This can lead to data being accepted which may be processed differently by other implementations. Use "validate=True" to enable stricter processing of base64 data.
Title Base64 decoding stops at first padded quad by default
References
Metrics cvssV4_0

{'score': 6, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: PSF

Published:

Updated: 2026-04-13T16:07:24.229Z

Reserved: 2026-03-02T16:15:14.567Z

Link: CVE-2026-3446

cve-icon Vulnrichment

Updated: 2026-04-13T16:07:10.721Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-10T19:16:26.220

Modified: 2026-04-13T17:16:30.610

Link: CVE-2026-3446

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-10T18:17:35Z

Links: CVE-2026-3446 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:00:07Z

Weaknesses