CVE-2025-69534 Affecting py3.11-markdown-bin package, versions <3.8.1-r0


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-MINIMOSLATEST-PY311MARKDOWNBIN-15438587
  • published7 Mar 2026
  • disclosed5 Mar 2026

Introduced: 5 Mar 2026

NewCVE-2025-69534  (opens in a new tab)

How to fix?

Upgrade Minimos:latest py3.11-markdown-bin to version 3.8.1-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream py3.11-markdown-bin package and not the py3.11-markdown-bin package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

Python-Markdown version 3.8 contain a vulnerability where malformed HTML-like sequences can cause html.parser.HTMLParser to raise an unhandled AssertionError during Markdown parsing. Because Python-Markdown does not catch this exception, any application that processes attacker-controlled Markdown may crash. This enables remote, unauthenticated Denial of Service in web applications, documentation systems, CI/CD pipelines, and any service that renders untrusted Markdown. The issue was acknowledged by the vendor and fixed in version 3.8.1. This issue causes a remote Denial of Service in any application parsing untrusted Markdown, and can lead to Information Disclosure through uncaught exceptions.

CVSS Base Scores

version 3.1