CVE-2023-26112
Python vulnerability analysis and mitigation

Overview

The vulnerability CVE-2023-26112 affects all versions of the configobj package, which is a configuration file reader and writer for Python. The vulnerability was discovered on January 29, 2023, and publicly disclosed on April 3, 2023. It is identified as a Regular Expression Denial of Service (ReDoS) vulnerability that exists in the validate function, specifically involving the regular expression pattern (.+?)((.*)) (NVD, Snyk Advisory).

Technical details

The vulnerability is classified as CWE-1333 (Inefficient Regular Expression Complexity) and has received varying CVSS scores: NVD rates it as 5.9 (Medium) with vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H, while Snyk assigns a score of 3.7 (Low) with vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L. The vulnerability exists in the validate function where a problematic regular expression pattern can cause catastrophic backtracking (NVD, Snyk Advisory).

Impact

The vulnerability can lead to a Denial of Service condition through Regular Expression Denial of Service (ReDoS). However, it's important to note that this is only exploitable in cases where a developer puts the offending value in a server-side configuration file (NVD).

Mitigation and workarounds

The vulnerability has been patched in various distributions. Ubuntu has released fixes in versions 5.0.6-5ubuntu0.1 for Ubuntu 22.04, 5.0.6-4ubuntu0.1 for Ubuntu 20.04, and similar updates for other versions. Fedora has addressed the issue in version 5.0.8-6 across different releases. Users are advised to upgrade to the fixed versions (Ubuntu Notice, Fedora Update).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66471HIGH8.9
  • PythonPython
  • urllib3
NoYesDec 05, 2025
CVE-2025-66418HIGH8.9
  • PythonPython
  • python-urllib3
NoYesDec 05, 2025
CVE-2025-65958HIGH8.5
  • PythonPython
  • cpe:2.3:a:openwebui:open_webui
NoYesDec 04, 2025
CVE-2025-56427HIGH7.5
  • PythonPython
  • composio
NoNoDec 04, 2025
CVE-2025-63681MEDIUM4.3
  • PythonPython
  • open-webui
NoNoDec 04, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management