Improper Encoding or Escaping of Output Affecting python-ldap package, versions *


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN14-PYTHONLDAP-13534793
  • published12 Oct 2025
  • disclosed10 Oct 2025

Introduced: 10 Oct 2025

NewCVE-2025-61912  (opens in a new tab)
CWE-116  (opens in a new tab)
CWE-170  (opens in a new tab)

How to fix?

There is no fixed version for Debian:14 python-ldap.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python-ldap package and not the python-ldap package as distributed by Debian. See How to fix? for Debian:14 relevant fixed versions and status.

python-ldap is a lightweight directory access protocol (LDAP) client API for Python. In versions prior to 3.4.5, ldap.dn.escape_dn_chars() escapes \x00 incorrectly by emitting a backslash followed by a literal NUL byte instead of the RFC-4514 hex form \00. Any application that uses this helper to construct DNs from untrusted input can be made to consistently fail before a request is sent to the LDAP server (e.g., AD), resulting in a client-side denial of service. Version 3.4.5 contains a patch for the issue.