
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
The Python standard library functions urllib.parse.urlsplit
and urlparse
contained a vulnerability (CVE-2025-0938) discovered in January 2025. The functions incorrectly accepted domain names containing square brackets, which violates RFC 3986 specifications that restrict square brackets to only be used as delimiters for IPv6 and IPvFuture hosts in URLs (Red Hat CVE, Python Security).
The vulnerability stems from the URL parsing algorithm's incomplete handling of square brackets in hostnames. The implementation would accept URLs with square brackets embedded within domain names, such as 'http://prefix.[v1.example]/' and 'http://[v1.example].postfix/', instead of rejecting them as invalid. According to RFC 3986 and the WHATWG URL standard, square brackets are only valid when used as delimiters for IPv6 or IPvFuture addresses at the start and end of the hostname section (GitHub Issue). The vulnerability has been assigned a CVSS v3.1 score of 6.8 (Medium) with the vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N (Red Hat CVE).
This vulnerability could result in differential parsing behavior between Python's URL parser and other specification-compliant URL parsers. The inconsistency could potentially lead to security issues in applications that rely on consistent URL parsing behavior, particularly in scenarios involving security decisions based on hostname validation (Red Hat CVE).
The issue has been fixed in Python versions 3.13.2-1, 3.12.9-1, and patches are being backported to earlier supported versions. For affected versions where patches are not yet available, Red Hat notes that mitigation options either do not exist or do not meet their security criteria for ease of use, deployment, and stability (Red Hat CVE, Debian Tracker).
The vulnerability has particularly impacted users of Django and django-environ, with some reporting broken functionality in production environments due to the presence of square brackets in PostgreSQL passwords. The issue was noted as a significant breaking change that affected systems after upgrading to Python 3.11.4 (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”