The fix for CVE-2026-0672, which rejected control characters in http.cookies.Morsel, was incomplete. The Morsel.update(), |= operator, and unpickling paths were not patched, allowing control characters to bypass input validation. Additionally, BaseCookie.js_output() lacked the output validation applied to BaseCookie.output().
| Vendor | Product | Versions |
|---|---|---|
| python software foundation | cpython | 0, 3.14.0, 3.15.0a1 |
Downstream vendors/products affected by this vulnerability
| Vendor | Product | Source | Confidence |
|---|---|---|---|
| amazon | amazon linux | cert_advisory | 90% |
| fedora | fedora linux | cert_advisory | 90% |
| open source | python | cert_advisory | 90% |