Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to 2.20.0, CORSConfig.allowed_origins_regex is constructed using a regex built from configured allowlist values and used with fullmatch() for validation. Because metacharacters are not escaped, a malicious origin can match unexpectedly. The check relies on allowed_origins_regex.fullmatch(origin). This vulnerability is fixed in 2.20.0.
Metrics
Affected Vendors & Products
References
History
Tue, 10 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Feb 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Litestar-org
Litestar-org litestar |
|
| Vendors & Products |
Litestar-org
Litestar-org litestar |
Mon, 09 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to 2.20.0, CORSConfig.allowed_origins_regex is constructed using a regex built from configured allowlist values and used with fullmatch() for validation. Because metacharacters are not escaped, a malicious origin can match unexpectedly. The check relies on allowed_origins_regex.fullmatch(origin). This vulnerability is fixed in 2.20.0. | |
| Title | Litestar has a CORS origin allowlist bypass due to unescaped regex metacharacters in allowed origins | |
| Weaknesses | CWE-942 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-02-09T18:46:56.445Z
Updated: 2026-02-10T16:01:16.807Z
Reserved: 2026-02-02T16:31:35.820Z
Link: CVE-2026-25478
Updated: 2026-02-10T15:30:26.193Z
Status : Awaiting Analysis
Published: 2026-02-09T20:15:57.017
Modified: 2026-02-09T21:55:30.093
Link: CVE-2026-25478
No data.