CVE-2026-4519

Published: March 21, 2026Last modified: March 28, 2026

Description

The webbrowser.open() API would accept leading dashes in the URL which could be handled as command line options for certain web browsers. New behavior rejects leading dashes. Users are recommended to sanitize URLs prior to passing to webbrowser.open().

Severity score breakdown

ParameterValue
Base score3.3
Attack VectorLOCAL
Attack complexityLOW
Privileges requiredNONE
User interactionREQUIRED
ScopeUNCHANGED
ConfidentialityNONE
Integrity impactLOW
Availability impactNONE
VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTSpython3Fixed (3.11.15-r1)
25 LTSpython3Fixed (3.12.13-r1)
Streampython3Fixed (3.12.13-r1)
Hardened Containers23 LTSpython3Fixed (3.11.15-r1)
25 LTSpython3Fixed (3.12.13-r1)
Streampython3Fixed (3.12.13-r1)

References

ON THIS PAGE