CVE-2023-50715
Python vulnerability analysis and mitigation

Overview

Home Assistant, an open source home automation software, contained a vulnerability (CVE-2023-50715) prior to version 2023.12.3 where the login page disclosed all active user accounts to any unauthenticated browsing request originating on the Local Area Network. The vulnerability was discovered and disclosed on December 14, 2023, affecting all Home Assistant installations before version 2023.12.3 (GitHub Advisory).

Technical details

The vulnerability occurred when the Home Assistant login page returned all currently active user accounts to browsing requests from the Local Area Network. This disclosure happened under two conditions: when the request was not authenticated and when the request originated locally (on the Home Assistant host local subnet or any private subnet including 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, fd00::/8, ::ffff:10.0.0.0/104, ::ffff:172.16.0.0/108, ::ffff:192.168.0.0/112). The vulnerability has been assigned a CVSS v3.1 base score of 4.3 (Medium) with the vector string: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N (GitHub Advisory).

Impact

The vulnerability allowed any unauthenticated actor on the local network to view all user accounts, including their profile photos, regardless of whether they had logged in or not. While the disclosure was limited to requests originating from LAN addresses, it affected any private subnet that could reach the Home Assistant instance (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in Home Assistant version 2023.12.3. Users are advised to upgrade to this version or later to address the issue. The fix involved disabling the user profiles feature on the login screen (GitHub Patch).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22033HIGH8.6
  • PythonPython
  • label-studio
NoNoJan 12, 2026
CVE-2025-68472HIGH8.1
  • PythonPython
  • mindsdb
NoYesJan 12, 2026
CVE-2026-22251MEDIUM5.3
  • PythonPython
  • wlc
NoYesJan 12, 2026
CVE-2026-22691LOW2.7
  • PythonPython
  • pypdf2
NoYesJan 10, 2026
CVE-2026-22250LOW2.5
  • PythonPython
  • wlc
NoYesJan 12, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management