Description
Mitgation of CVE-2026-4519 was incomplete. If the URL contained "%action" the mitigation could be bypassed for certain browser types the "webbrowser.open()" API could have commands injected into the underlying shell. See CVE-2026-4519 for details.
Published: 2026-04-13
Score: 7 High
EPSS: < 1% Very Low
KEV: No
Impact: Command Injection leading to arbitrary code execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability arises from incomplete mitigation of a prior issue (CVE-2026-4519). When a URL containing the string '%action' is passed to Python's webbrowser.open() function, the %action sequence is expanded by certain browsers, allowing an attacker to inject commands into the underlying system shell. This bypasses the existing safeguard and can execute arbitrary shell commands. The weakness is a classic command injection problem (CWE-77).

Affected Systems

The affected product is the CPython interpreter, maintained by the Python Software Foundation. No specific version range is listed in the CNA data, so any CPython installation that includes the vulnerable webbrowser.open implementation may be affected until the patch is applied. Review releases following the GitHub pull request to identify impacted releases.

Risk and Exploitability

The CVSS base score is 7, indicating a high severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalogue, suggesting no known widespread exploitation yet. The likely attack requires a crafted URL string to be processed by an application that calls webbrowser.open. An attacker would need the ability to influence that input, which could be within a local environment or within a web application that passes user‑provided URLs. Thus the risk is moderate to high, depending on deployment context. Prompt patching mitigates the risk.

Generated by OpenCVE AI on April 13, 2026 at 23:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update CPython to a version that includes the fix from pull request 148170 (or apply the patch).
  • If an immediate upgrade is not possible, ensure that webbrowser.open() is not called with untrusted URLs, or remove usage of the function in applications until the patch is applied.
  • Regularly monitor the Python release channel and security mailing lists for additional advisories.

Generated by OpenCVE AI on April 13, 2026 at 23:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-88
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}

threat_severity

Important


Tue, 14 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Python
Python cpython
Vendors & Products Python
Python cpython

Tue, 14 Apr 2026 15:00:00 +0000


Tue, 14 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 22:00:00 +0000

Type Values Removed Values Added
Description Mitgation of CVE-2026-4519 was incomplete. If the URL contained "%action" the mitigation could be bypassed for certain browser types the "webbrowser.open()" API could have commands injected into the underlying shell. See CVE-2026-4519 for details.
Title Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()
Weaknesses CWE-77
References
Metrics cvssV4_0

{'score': 7, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: PSF

Published:

Updated: 2026-04-14T14:30:19.762Z

Reserved: 2026-03-24T19:25:48.269Z

Link: CVE-2026-4786

cve-icon Vulnrichment

Updated: 2026-04-14T13:43:51.497Z

cve-icon NVD

Status : Received

Published: 2026-04-13T22:16:30.413

Modified: 2026-04-14T15:16:39.417

Link: CVE-2026-4786

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-13T21:52:19Z

Links: CVE-2026-4786 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:32:54Z

Weaknesses