Open Redirect Affecting urllib3 package, versions [,2.5.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Open Redirect vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-URLLIB3-10390193
  • published19 Jun 2025
  • disclosed18 Jun 2025
  • creditIllia Volochii

Introduced: 18 Jun 2025

NewCVE-2025-50182  (opens in a new tab)
CWE-601  (opens in a new tab)

How to fix?

Upgrade urllib3 to version 2.5.0 or higher.

Overview

urllib3 is a HTTP library with thread-safe connection pooling, file post, and more.

Affected versions of this package are vulnerable to Open Redirect when used within a Pyodide runtime utilizing the JavaScript Fetch API or falling back on XMLHttpRequest, due to the retries and redirect parameters being ignored and the runtime determining redirect behavior. An attacker can access sensitive information by leveraging uncontrolled redirects in browsers or Node.js environments.

Notes:

  1. This is only exploitable if the application relies on the retries and redirect parameters to limit or prevent redirects;

  2. This issue was fixed in version 2.5.0 for Node.js environments but not for browsers due to XMLHttpRequest providing no control over redirects. Default browser behavior for redirects should be expected.

References

CVSS Base Scores

version 4.0
version 3.1