Open Redirect Affecting urllib3 package, versions [,2.5.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Open Redirect vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-URLLIB3-10390194
  • published19 Jun 2025
  • disclosed18 Jun 2025
  • creditJacob Sandum

Introduced: 18 Jun 2025

NewCVE-2025-50181  (opens in a new tab)
CWE-601  (opens in a new tab)

How to fix?

Upgrade urllib3 to version 2.5.0 or higher.

Overview

urllib3 is a HTTP library with thread-safe connection pooling, file post, and more.

Affected versions of this package are vulnerable to Open Redirect due to the retries parameter being ignored during PoolManager instantiation. An attacker can access unintended resources or endpoints by leveraging automatic redirects when the application expects redirects to be disabled at the connection pool level.

Note:

requests and botocore users are not affected.

Workaround

This can be mitigated by disabling redirects at the request() level instead of the PoolManager() level.

References

CVSS Base Scores

version 4.0
version 3.1