CVE-2025-1795
Python Interpreter vulnerability analysis and mitigation

Overview

CVE-2025-1795 is a vulnerability in Python's email header handling functionality discovered in February 2025. The issue occurs during address list folding when a separating comma ends up on a folded line that needs to be unicode-encoded, causing the separator itself to be incorrectly unicode-encoded instead of remaining as a plain comma. This vulnerability affects multiple versions of Python including Python 3.9, 3.11, and 3.12 (Debian Tracker).

Technical details

The vulnerability stems from incorrect handling of list separators in the email/headervalue_parser module. When a long email address header needs to be folded and contains unicode characters, the comma separator gets incorrectly encoded if it appears at the fold point. The issue has been assigned a CVSS v4.0 score of 2.3 (LOW) with the vector string CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N. The vulnerability is classified as CWE-116 (Improper Encoding or Escaping of Output) (NVD, Red Hat).

Impact

The vulnerability can result in email address headers being misinterpreted by some mail servers, potentially leading to delivery issues or rejection of emails. The impact is considered low as it requires specific conditions to be exploited and only affects email header processing (Python Security).

Mitigation and workarounds

Fixes have been released for multiple Python versions. Python 3.13.2-1 and 3.12.9-1 include the fix, while updates are pending for other affected versions. The issue was addressed by modifying the ListSeparator handling in the email/headervalue_parser module to prevent unicode encoding of the separator character (Debian Tracker).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management