Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1167 articles · 105240 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-4519EXPLOITED
Python · Python

The webbrowser.open() API would accept leading dashes in the URL which could be handled as command line options for certain web browsers. New behavior rejects leading dashes. Users are recommended t

Description

An attacker can exploit a vulnerability in Python to execute arbitrary program code.

Affected Products

VendorProductVersions
PythonPython—

References

  • https://github.com/python/cpython/commit/43fe06b96f6a6cf5cfd5bdab20b8649374956866
  • https://github.com/python/cpython/commit/82a24a4442312bdcfc4c799885e8b3e00990f02b
  • https://github.com/python/cpython/commit/9669a912a0e329c094e992204d6bdb8787024d76
  • https://github.com/python/cpython/commit/ad4d5ba32af4d80b0dfa2ba9d8203bfb219e60a5
  • https://github.com/python/cpython/commit/cbba6119391112aba9c5aebf7b94aea447922c48
  • https://github.com/python/cpython/commit/ceac1efc66516ac387eef2c9a0ce671895b44f03
  • https://github.com/python/cpython/issues/143930
  • https://github.com/python/cpython/pull/143931
  • https://mail.python.org/archives/list/security-announce@python.org/thread/AY5NDSS433JK56Q7Q5IS7B37QFZVVOUS/
  • http://www.openwall.com/lists/oss-security/2026/03/20/1

Related News (3 articles)

Tier B
BSI Advisories22h ago
[UPDATE] [mittel] Python: Schwachstelle ermöglicht Codeausführung
→ No new info (linked only)
Tier A
Microsoft MSRC2d ago
CVE-2026-4519 webbrowser.open() allows leading dashes in URLs
→ No new info (linked only)
Tier B
CERT-FR4d ago
Vulnérabilité dans CPython (23 mars 2026)
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-20
Published3/20/2026
Last enriched4h agov3
Trending Score55
Source articles3
Independent3
Info Completeness7/14
Missing: versions, cvss, epss, kev, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Version History

v3
Last enriched 4h ago
v3Tier B4h ago

Updated description to include arbitrary code execution and changed severity to HIGH.

descriptionseverityexploitAvailableactivelyExploited
via BSI Advisories
v2Tier B11h ago

Added vendor and product as Python, updated severity to HIGH, and marked exploit as available and actively exploited.

vendorproduct
via BSI Advisories
v112h ago

Initial creation