CVE-2025-50182
Python vulnerability analysis and mitigation

Overview

CVE-2025-50182 affects urllib3, a user-friendly HTTP client library for Python, in versions 2.2.0 to 2.5.0. The vulnerability was discovered and disclosed on June 18, 2025, specifically impacting systems utilizing urllib3 with Pyodide runtime that leverages JavaScript Fetch API or XMLHttpRequest. The core issue relates to the library's inability to control redirects in browsers and Node.js environments when used in a Pyodide runtime (GitHub Advisory, NVD).

Technical details

The vulnerability stems from urllib3's implementation when used in a Pyodide runtime environment. While urllib3 provides mechanisms to control redirects through retries and redirect parameters, these controls are ignored in Pyodide environments where the runtime itself determines redirect behavior. The issue has been assigned a CVSS v3.1 base score of 5.3 (Medium) with the vector string CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N, indicating network attack vector with high complexity, requiring low privileges but no user interaction (GitHub Advisory, Wiz).

Impact

The vulnerability primarily affects applications attempting to mitigate SSRF (Server-Side Request Forgery) or open redirect vulnerabilities by disabling redirects. When using urllib3 in a Pyodide runtime, these security controls may be bypassed as the runtime's redirect mechanism takes precedence, potentially leaving applications vulnerable to SSRF attacks (GitHub Advisory).

Mitigation and workarounds

For Node.js environments, upgrading to urllib3 version 2.5.0 or later is recommended as it includes a patch for this vulnerability. For browser environments, no direct workaround is available as browsers provide no suitable mechanism for urllib3 to control redirects - XMLHttpRequest provides no control over redirects, and the Fetch API returns opaqueredirect responses lacking data when redirects are controlled manually (GitHub Advisory, Ubuntu Notice).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67511CRITICAL9.6
  • PythonPython
  • cai-framework
NoNoDec 11, 2025
CVE-2025-13780CRITICAL9.1
  • PythonPython
  • pgadmin4
NoYesDec 11, 2025
CVE-2025-67644HIGH7.3
  • PythonPython
  • langgraph-checkpoint-sqlite
NoYesDec 11, 2025
CVE-2025-67720MEDIUM6.5
  • PythonPython
  • pyrofork
NoYesDec 11, 2025
CVE-2025-67485MEDIUM5.3
  • PythonPython
  • mad-proxy
NoNoDec 10, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management