Description
The webbrowser.open() API would accept leading dashes in the URL which
could be handled as command line options for certain web browsers. New
behavior rejects leading dashes. Users are recommended to sanitize URLs
prior to passing to webbrowser.open().
Published: 2026-03-20
Score: 7 High
EPSS: < 1% Very Low
KEV: No
Impact: Command Injection via webbrowser.open()
Action: Apply Patch
AI Analysis

Impact

The webbrowser.open() function in CPython accepts URLs that begin with a hyphen. Certain web browsers interpret such leading dashes as command‑line options, allowing an attacker to influence the browser’s behavior or execute arbitrary commands. This lack of input validation is a classic command‑injection issue that can compromise confidentiality, integrity, or availability of the victim system.

Affected Systems

Python software, specifically the CPython interpreter’s standard library webbrowser module, is affected. The vulnerability applies to any CPython installation that has not incorporated the patches referenced in the advisory; version numbers are not explicitly provided, so all pre‑patch releases are potentially vulnerable.

Risk and Exploitability

With a CVSS score of 7, the vulnerability is of medium‑to‑high severity, yet an EPSS score of less than 1% indicates a low probability of exploitation. It is not listed in the CISA KEV catalog. Exploitation requires an attacker to supply a crafted URL to webbrowser.open() – typically in applications that accept user input – making the attack vector local to the user’s code execution environment. The risk level is therefore contingent on the application's exposure to untrusted URLs.

Generated by OpenCVE AI on March 25, 2026 at 16:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update CPython to a version that includes the fix referenced in the advisory.
  • Sanitize all URLs before passing them to webbrowser.open(); strip leading dashes or validate against a strict regex for allowed URL schemes.
  • Restrict user input or whitelist approved URLs in applications that use webbrowser.open().
  • If an immediate update is not feasible, consider rewriting the code to use alternative mechanisms that validate URLs before invoking the browser.

Generated by OpenCVE AI on March 25, 2026 at 16:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 20:45:00 +0000


Wed, 25 Mar 2026 17:45:00 +0000


Wed, 25 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 19:30:00 +0000


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Python
Python cpython
Vendors & Products Python
Python cpython

Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-88
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L'}

threat_severity

Important


Fri, 20 Mar 2026 21:30:00 +0000

Type Values Removed Values Added
References

Fri, 20 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
Metrics cvssV4_0

{'score': 5.7, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}

cvssV4_0

{'score': 7, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Fri, 20 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Description The webbrowser.open() API would accept leading dashes in the URL which could be handled as command line options for certain web browsers. New behavior rejects leading dashes. Users are recommended to sanitize URLs prior to passing to webbrowser.open().
Title webbrowser.open() allows leading dashes in URLs
References
Metrics cvssV4_0

{'score': 5.7, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: PSF

Published:

Updated: 2026-04-13T21:47:40.137Z

Reserved: 2026-03-20T15:01:11.126Z

Link: CVE-2026-4519

cve-icon Vulnrichment

Updated: 2026-03-20T20:07:08.244Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-20T15:16:24.057

Modified: 2026-04-07T18:16:47.223

Link: CVE-2026-4519

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-20T15:08:32Z

Links: CVE-2026-4519 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T21:28:16Z

Weaknesses