Skip to content

VULN UPGRADE: urllib3 (major → 2.6.3) #3950

Open
campaigner-prod[bot] wants to merge 1 commit intomasterfrom
engraver-auto-version-upgrade/major/pip/1-1770924007
Open

VULN UPGRADE: urllib3 (major → 2.6.3) #3950
campaigner-prod[bot] wants to merge 1 commit intomasterfrom
engraver-auto-version-upgrade/major/pip/1-1770924007

Conversation

@campaigner-prod
Copy link

Summary: High-severity security update — 1 package upgraded (MAJOR changes included)

Manifests changed:

  • . (pip)

Updates

Package From To Type Vulnerabilities Fixed
urllib3 1.24.3 2.6.3 major 12 HIGH, 8 MODERATE, 2 MEDIUM

Warning

Major Version Upgrade

This update includes major version changes that may contain breaking changes. Please:

  • Review the changelog/release notes for breaking changes
  • Test thoroughly in a staging environment
  • Update any code that depends on changed APIs
  • Ensure all tests pass before merging

Security Details

🚨 Critical & High Severity (12 fixed)
Package CVE Severity Summary Unsafe Version Fixed In
urllib3 GHSA-gm62-xv2j-4w53 HIGH urllib3 allows an unbounded number of links in the decompression chain 1.24.3 2.6.0
urllib3 PYSEC-2021-108 high - 1.24.3 2d4a3fee6de2fa45eb82169361918f759269b4ec
urllib3 CVE-2025-66471 HIGH urllib3 Streaming API improperly handles highly compressed data 1.24.3 -
urllib3 CVE-2026-21441 HIGH urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API) 1.24.3 -
urllib3 GHSA-38jv-5279-wg99 HIGH Decompression-bomb safeguards bypassed when following HTTP redirects (streaming API) 1.24.3 2.6.3
urllib3 CVE-2021-33503 high - 1.24.3 -
urllib3 GHSA-q2q7-5pp4-w6pg HIGH Catastrophic backtracking in URL authority parser when passed URL containing many @ characters 1.24.3 1.26.5
urllib3 GHSA-v845-jxx5-vc9f HIGH Cookie HTTP header isn't stripped on cross-origin redirects 1.24.3 2.0.6
urllib3 CVE-2023-43804 HIGH Cookie HTTP header isn't stripped on cross-origin redirects 1.24.3 -
urllib3 PYSEC-2023-192 HIGH - 1.24.3 644124ecd0b6e417c527191f866daa05a5a2056d
urllib3 CVE-2025-66418 HIGH urllib3 allows an unbounded number of links in the decompression chain 1.24.3 -
urllib3 GHSA-2xpw-w6gg-jr37 HIGH urllib3 streaming API improperly handles highly compressed data 1.24.3 2.6.0
ℹ️ Other Vulnerabilities (10)
Package CVE Severity Summary Unsafe Version Fixed In
urllib3 PYSEC-2020-148 medium - 1.24.3 1dd69c5c5982fae7c87a620d487c2ebf7a6b436b
urllib3 CVE-2020-26137 medium - 1.24.3 -
urllib3 PYSEC-2023-212 MODERATE - 1.24.3 4e98d57809dacab1cbe625fddeec1a290c478ea9
urllib3 CVE-2023-45803 MODERATE Request body not stripped after redirect in urllib3 1.24.3 -
urllib3 GHSA-g4mx-q9vg-27p4 MODERATE urllib3's request body not stripped after redirect from 303 status changes request method to GET 1.24.3 2.0.7
urllib3 CVE-2025-50181 MODERATE urllib3 redirects are not disabled when retries are disabled on PoolManager instantiation 1.24.3 -
urllib3 GHSA-pq67-6m6q-mj2v MODERATE urllib3 redirects are not disabled when retries are disabled on PoolManager instantiation 1.24.3 2.5.0
urllib3 GHSA-wqvq-5m8c-6g24 MODERATE CRLF injection in urllib3 1.24.3 1.25.9
urllib3 CVE-2024-37891 MODERATE Proxy-Authorization request header isn't stripped during cross-origin redirects in urllib3 1.24.3 -
urllib3 GHSA-34jh-p97f-mpxf MODERATE urllib3's Proxy-Authorization request header isn't stripped during cross-origin redirects 1.24.3 1.26.19
⚠️ Dependencies that have Reached EOL (1)
Dependency Unsafe Version EOL Date New Version Path
urllib3 1.24.3 - 2.6.3 requirements.txt

Review Checklist

Extra review is recommended for this update:

  • Review changes for compatibility with your code
  • Check release notes for breaking changes
  • Run integration tests to verify service behavior
  • Test in staging environment before production
  • Monitor key metrics after deployment

Update Mode: Vulnerability Remediation (High)

🤖 Generated by DataDog Automated Dependency Management System

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants