CVE-2026-25645
MED 4.4Requests is a HTTP library. Prior to version 2.33.0, the `requests.utils.extract_zipped_paths()` utility function uses a predictable filename when extracting files from zip archives into the system temporary directory. If the target file already exists, it is reused without validation. A local attacker with write access to the temp directory could pre-create a malicious file that would be loaded in place of the legitimate one. Standard usage of the Requests library is not affected by this vulnerability. Only applications that call `extract_zipped_paths()` directly are impacted. Starting in version 2.33.0, the library extracts files to a non-deterministic location. If developers are unable to upgrade, they can set `TMPDIR` in their environment to a directory with restricted write access.
Affected Applications in Environment
15
Python
v2.7.8
1 device
Python
11 devices
Python
v2.7.16
1 device
Python
vWindows 11 (26.57288.0)
1 device
python
v2.7.15~rc1-1
1 device
python
v2.7.12-1~16.04
4 devices
python
v2.7.16-1
3 devices
python
v2.7.5-5ubuntu3
1 device
python
v2.7.5-93.el7_9
1 device
python-apt
v1.1.0~beta1ubuntu0.16.04.12
2 devices
python-apt
v2.0.1ubuntu0.20.04.1
1 device
python-apt
v1.8.4.3
1 device
python-apt
v0.9.3.5ubuntu3
1 device
python-apt
v1.6.6
1 device
python-ldap
v0:2.4.15-2.el7
1 device
Affected Devices
23
Brians-Mac-mini.local
Mac
Kellys-MacBook-Pro-3.local
Mac
MacBook-Pro.local
Mac
a00017110-J7TV3C9HW5
Mac
a00344487-F622TJW0NM
Mac
a02235045-MX74HJV2J3
Mac
a02265864-LFW93MQ9P7
Mac
a02388352-LQ22WMQLKF
Mac
a02424859-LHV909KCR7
Mac
a02456553-G06QD7XKWW
Mac
a02513954-D2V97K4D2L
Mac
dispatch
Linux
guru.cluster
Linux
hotcheeto
Linux
mac.lan
Mac
minemeld
Linux
my2
Linux
s2backups
Linux
web04a
Linux
web05
Linux
web21
Linux
web22
Linux
webs.usu.edu
Linux