The fix for CVE-2026-0672, which rejected control characters in http.cookies.Morsel, was incomplete. The Morsel.update(), |= operator, and unpickling paths were not patched, allowing control characters to bypass input validation. Additionally, BaseCookie.js_output() lacked the output validation applied to BaseCookie.output().
History

Mon, 16 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-116
CWE-20
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 18:15:00 +0000


Mon, 16 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
Description The fix for CVE-2026-0672, which rejected control characters in http.cookies.Morsel, was incomplete. The Morsel.update(), |= operator, and unpickling paths were not patched, allowing control characters to bypass input validation. Additionally, BaseCookie.js_output() lacked the output validation applied to BaseCookie.output().
Title Incomplete control character validation in http.cookies
References
Metrics cvssV4_0

{'score': 6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: PSF

Published: 2026-03-16T17:37:31.344Z

Updated: 2026-03-16T18:25:55.021Z

Reserved: 2026-03-06T16:13:09.289Z

Link: CVE-2026-3644

cve-icon Vulnrichment

Updated: 2026-03-16T18:24:32.300Z

cve-icon NVD

Status : Received

Published: 2026-03-16T18:16:09.907

Modified: 2026-03-16T19:16:18.013

Link: CVE-2026-3644

cve-icon Redhat

No data.