{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T06:25:32.165","vulnerabilities":[{"cve":{"id":"CVE-2025-50182","sourceIdentifier":"security-advisories@github.com","published":"2025-06-19T02:15:17.967","lastModified":"2025-12-22T19:15:49.177","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"urllib3 is a user-friendly HTTP client library for Python. Starting in version 2.2.0 and prior to 2.5.0, urllib3 does not control redirects in browsers and Node.js. urllib3 supports being used in a Pyodide runtime utilizing the JavaScript Fetch API or falling back on XMLHttpRequest. This means Python libraries can be used to make HTTP requests from a browser or Node.js. Additionally, urllib3 provides a mechanism to control redirects, but the retries and redirect parameters are ignored with Pyodide; the runtime itself determines redirect behavior. This issue has been patched in version 2.5.0."},{"lang":"es","value":"urllib3 es una librería cliente HTTP intuitiva para Python. Antes de la versión 2.5.0, urllib3 no controlaba las redirecciones en navegadores ni en Node.js. urllib3 admite su uso en un entorno de ejecución de Pyodide mediante la API Fetch de JavaScript o recurriendo a XMLHttpRequest. Esto significa que las librerías de Python pueden usarse para realizar solicitudes HTTP desde un navegador o Node.js. Además, urllib3 proporciona un mecanismo para controlar las redirecciones, pero los reintentos y los parámetros de redirección se ignoran con Pyodide; el propio entorno de ejecución determina el comportamiento de la redirección. Este problema se ha corregido en la versión 2.5.0."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-601"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*","versionStartIncluding":"2.2.0","versionEndExcluding":"2.5.0","matchCriteriaId":"BE36BE5C-CEA2-4293-9C38-969D00475CB4"}]}]}],"references":[{"url":"https://github.com/urllib3/urllib3/commit/7eb4a2aafe49a279c29b6d1f0ed0f42e9736194f","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/urllib3/urllib3/releases/tag/2.5.0","source":"security-advisories@github.com"},{"url":"https://github.com/urllib3/urllib3/security/advisories/GHSA-48p4-8xcf-vxj5","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}