Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. microdot
  4. ›
  5. CVE-2026-42874

CVE-2026-42874: Microdot has HTTP response splitting in Response.set_cookie()

May 5, 2026

The Response.set_cookie() method does not sanitize its string arguments, and in particular will not detect the presence of the \r\n sequence in them. This can be a potential source of header injection attacks.

For a header injection attack through this issue to be possible, an attacker must first infiltrate the client (for example through an independent XSS attack), so that it can send malicious information that is destined to be stored in a cookie by the server on behalf of the victim. An attacker that infiltrates one client can only orchestrate a header injection attack for that client, all other clients that were not infiltrated are safe.

References

  • github.com/advisories/GHSA-7wc8-wvc4-m498
  • github.com/miguelgrinberg/microdot
  • github.com/miguelgrinberg/microdot/blob/main/CHANGES.md
  • github.com/miguelgrinberg/microdot/commit/99b281b45faef8472410f2d56bfef496dfbd95d5
  • github.com/miguelgrinberg/microdot/security/advisories/GHSA-7wc8-wvc4-m498
  • nvd.nist.gov/vuln/detail/CVE-2026-42874

Code Behaviors & Features

Detect and mitigate CVE-2026-42874 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.6.1

Fixed versions

  • 2.6.1

Solution

Upgrade to version 2.6.1 or above.

Impact 3.7 LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')

Source file

pypi/microdot/CVE-2026-42874.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 00:18:14 +0000.