{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T16:35:22.683","vulnerabilities":[{"cve":{"id":"CVE-2025-50181","sourceIdentifier":"security-advisories@github.com","published":"2025-06-19T01:15:24.453","lastModified":"2025-12-22T19:15:49.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"urllib3 is a user-friendly HTTP client library for Python. Prior to 2.5.0, it is possible to disable redirects for all requests by instantiating a PoolManager and specifying retries in a way that disable redirects. By default, requests and botocore users are not affected. An application attempting to mitigate SSRF or open redirect vulnerabilities by disabling redirects at the PoolManager level will remain vulnerable. This issue has been patched in version 2.5.0."},{"lang":"es","value":"urllib3 es una librería cliente HTTP intuitiva para Python. Antes de la versión 2.5.0, era posible deshabilitar las redirecciones para todas las solicitudes instanciando un PoolManager y especificando reintentos para deshabilitarlas. Por defecto, las solicitudes y los usuarios de botocore no se ven afectados. Una aplicación que intente mitigar vulnerabilidades de SSRF o de redirección abierta deshabilitando las redirecciones a nivel de PoolManager seguirá siendo vulnerable. Este problema se ha corregido en la versión 2.5.0."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-601"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*","versionEndExcluding":"2.5.0","matchCriteriaId":"45C2B2EF-1774-47F0-9480-F5CE26947B78"}]}]}],"references":[{"url":"https://github.com/urllib3/urllib3/commit/f05b1329126d5be6de501f9d1e3e36738bc08857","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/urllib3/urllib3/releases/tag/2.5.0","source":"security-advisories@github.com"},{"url":"https://github.com/urllib3/urllib3/security/advisories/GHSA-pq67-6m6q-mj2v","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}