CVE-2019-9674
Python vulnerability analysis and mitigation

Overview

CVE-2019-9674 affects Python's zipfile module through version 3.7.2. The vulnerability allows remote attackers to cause a denial of service (resource consumption) via a ZIP bomb attack. A ZIP bomb is a malicious archive file that can exhaust system resources when decompressed (CVE Details, NVD).

Technical details

The vulnerability exists in the Lib/zipfile.py component of Python. When processing ZIP files, the module does not implement protection against ZIP bombs, which are specially crafted archives that can expand to consume excessive system resources during decompression. The vulnerability has a CVSS 3.1 base score of 7.5 (High), with attack vector being Network, attack complexity Low, and no privileges or user interaction required (Ubuntu).

Impact

When exploited, this vulnerability can lead to denial of service through resource exhaustion. A malicious ZIP file can be crafted to be very small in its compressed form but expand to consume massive amounts of disk space and memory when decompressed, potentially overwhelming the system resources (Python Security).

Mitigation and workarounds

Rather than implementing direct fixes in the zipfile module, Python improved its documentation to reflect the dangers of ZIP bombs. Users are advised to never extract archives from untrusted sources without prior inspection. Applications can implement their own protection by checking compression ratios, limiting system resources, and validating file sizes before decompression (Python Bug Tracker).

Community reactions

The Python security team determined that this was primarily a documentation issue rather than a code vulnerability. The consensus was that the zipfile module, being a low-level component, should not implement ZIP bomb protection by default, but rather document the risks and let applications implement appropriate safeguards (Python Bug Tracker).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22033HIGH8.6
  • PythonPython
  • label-studio
NoNoJan 12, 2026
CVE-2025-68472HIGH8.1
  • PythonPython
  • mindsdb
NoYesJan 12, 2026
CVE-2026-22251MEDIUM5.3
  • PythonPython
  • wlc
NoYesJan 12, 2026
CVE-2026-22691LOW2.7
  • PythonPython
  • pypdf
NoYesJan 10, 2026
CVE-2026-22250LOW2.5
  • PythonPython
  • wlc
NoYesJan 12, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management