CVE-2023-46121
Python vulnerability analysis and mitigation

Overview

CVE-2023-46121 affects the Generic Extractor in yt-dlp, a youtube-dl fork with additional features and fixes. The vulnerability was discovered and disclosed on November 14, 2023, affecting versions from 2022.10.04 up to (excluding) 2023.11.14. The issue allows an attacker to set an arbitrary proxy for a request to an arbitrary URL, potentially leading to Man-in-the-Middle (MITM) attacks (NVD, GitHub Advisory).

Technical details

The vulnerability stems from yt-dlp's URL smuggling mechanism, which is used to pass control data between extractors. The Generic Extractor supports receiving arbitrary HTTP headers in a smuggled URL, including internal headers like 'Ytdl-request-proxy' and 'Ytdl-socks-proxy'. A maliciously crafted site could include these smuggled options in a URL, allowing the Generic Extractor to extract and redirect to itself, thereby enabling an attacker to set an arbitrary proxy for any URL requested by yt-dlp. The vulnerability has been assigned a CVSS v3.1 base score of 5.0 MEDIUM by GitHub and 3.7 LOW by NVD (NVD).

Impact

The vulnerability could lead to cookie exfiltration in cases where users have loaded cookies into yt-dlp for target sites that aren't marked as secure. An attacker could potentially MITM requests made to any website and set cookies for arbitrary sites. However, the impact is somewhat limited as most modern websites use HTTPS and set cookies as secure (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in version 2023.11.14, which removed the ability to smuggle 'http_headers' to the Generic extractor and other extractors using the same pattern. Users are advised to upgrade to this version. Those unable to upgrade should disable the Generic extractor or only pass trusted sites with trusted content, and take caution when using '--no-check-certificate' (NVD, Release Notes).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-21441HIGH8.9
  • PythonPython
  • urllib3
NoYesJan 07, 2026
CVE-2026-21851MEDIUM5.3
  • PythonPython
  • monai
NoNoJan 07, 2026
GHSA-f2mf-q878-gh58MEDIUM5.3
  • PythonPython
  • parsl
NoYesJan 06, 2026
CVE-2026-21883MEDIUM4.5
  • PythonPython
  • bokeh
NoYesJan 08, 2026
CVE-2026-22041LOW2
  • PythonPython
  • loggingredactor
NoYesJan 07, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management