| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-385b-344t-23es |
| vulnerability_id |
VCID-385b-344t-23es |
| summary |
Scrapy decompression bomb vulnerability
### Impact
Scrapy limits allowed response sizes by default through the [`DOWNLOAD_MAXSIZE`](https://docs.scrapy.org/en/latest/topics/settings.html#download-maxsize) and [`DOWNLOAD_WARNSIZE`](https://docs.scrapy.org/en/latest/topics/settings.html#download-warnsize) settings.
However, those limits were only being enforced during the download of the raw, usually-compressed response bodies, and not during decompression, making Scrapy vulnerable to [decompression bombs](https://cwe.mitre.org/data/definitions/409.html).
A malicious website being scraped could send a small response that, on decompression, could exhaust the memory available to the Scrapy process, potentially affecting any other process sharing that memory, and affecting disk usage in case of uncompressed response caching.
### Patches
Upgrade to Scrapy 2.11.1.
If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.11.1 is not an option, you may upgrade to Scrapy 1.8.4 instead.
### Workarounds
There is no easy workaround.
Disabling HTTP decompression altogether is impractical, as HTTP compression is a rather common practice.
However, it is technically possible to manually backport the 2.11.1 or 1.8.4 fix, replacing the corresponding components of an unpatched version of Scrapy with patched versions copied into your own code.
### Acknowledgements
This security issue was reported by @dmandefy [through huntr.com](https://huntr.com/bounties/c4a0fac9-0c5a-4718-9ee4-2d06d58adabb/). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-3572 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00157 |
| scoring_system |
epss |
| scoring_elements |
0.36643 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00157 |
| scoring_system |
epss |
| scoring_elements |
0.36576 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00157 |
| scoring_system |
epss |
| scoring_elements |
0.36532 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00157 |
| scoring_system |
epss |
| scoring_elements |
0.36556 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00157 |
| scoring_system |
epss |
| scoring_elements |
0.3659 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00157 |
| scoring_system |
epss |
| scoring_elements |
0.36584 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00157 |
| scoring_system |
epss |
| scoring_elements |
0.36565 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00157 |
| scoring_system |
epss |
| scoring_elements |
0.36513 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00157 |
| scoring_system |
epss |
| scoring_elements |
0.36675 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-3572 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-3572, GHSA-7j7m-v7m3-jqm7, GMS-2024-327
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-385b-344t-23es |
|
| 1 |
| url |
VCID-4vw6-u8m8-dbe2 |
| vulnerability_id |
VCID-4vw6-u8m8-dbe2 |
| summary |
Scrapy is a high-level web crawling and scraping framework for Python. If you use `HttpAuthMiddleware` (i.e. the `http_user` and `http_pass` spider attributes) for HTTP authentication, all requests will expose your credentials to the request target. This includes requests generated by Scrapy components, such as `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`, or as requests reached through redirects. Upgrade to Scrapy 2.5.1 and use the new `http_auth_domain` spider attribute to control which domains are allowed to receive the configured HTTP authentication credentials. If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.5.1 is not an option, you may upgrade to Scrapy 1.8.1 instead. If you cannot upgrade, set your HTTP authentication credentials on a per-request basis, using for example the `w3lib.http.basic_auth_header` function to convert your credentials into a value that you can assign to the `Authorization` header of your request, instead of defining your credentials globally using `HttpAuthMiddleware`. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-41125 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48478 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48505 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48481 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48487 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48432 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.4848 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48458 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.4849 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48422 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48541 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-41125 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/scrapy/scrapy |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/scrapy/scrapy |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:pypi/scrapy@1.8.1 |
| purl |
pkg:pypi/scrapy@1.8.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1k4b-pr5k-s7e5 |
|
| 1 |
| vulnerability |
VCID-385b-344t-23es |
|
| 2 |
| vulnerability |
VCID-64nx-aruy-q7gy |
|
| 3 |
| vulnerability |
VCID-dc1m-rt7j-w3af |
|
| 4 |
| vulnerability |
VCID-jvzg-u5ks-tkhd |
|
| 5 |
| vulnerability |
VCID-kgf5-wu3r-pqc6 |
|
| 6 |
| vulnerability |
VCID-m9gg-8qum-9bh2 |
|
| 7 |
| vulnerability |
VCID-nekz-z7zw-mfgz |
|
| 8 |
| vulnerability |
VCID-t5cn-a543-nyag |
|
| 9 |
| vulnerability |
VCID-ugxf-pfaw-rqbm |
|
| 10 |
| vulnerability |
VCID-urb1-hv1z-duga |
|
| 11 |
| vulnerability |
VCID-veaw-n6vt-zfgu |
|
| 12 |
| vulnerability |
VCID-x9ee-za9y-3fcb |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:pypi/scrapy@1.8.1 |
|
| 1 |
| url |
pkg:pypi/scrapy@2.5.1 |
| purl |
pkg:pypi/scrapy@2.5.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1k4b-pr5k-s7e5 |
|
| 1 |
| vulnerability |
VCID-385b-344t-23es |
|
| 2 |
| vulnerability |
VCID-64nx-aruy-q7gy |
|
| 3 |
| vulnerability |
VCID-dc1m-rt7j-w3af |
|
| 4 |
| vulnerability |
VCID-jvzg-u5ks-tkhd |
|
| 5 |
| vulnerability |
VCID-kgf5-wu3r-pqc6 |
|
| 6 |
| vulnerability |
VCID-m9gg-8qum-9bh2 |
|
| 7 |
| vulnerability |
VCID-nekz-z7zw-mfgz |
|
| 8 |
| vulnerability |
VCID-t5cn-a543-nyag |
|
| 9 |
| vulnerability |
VCID-ugxf-pfaw-rqbm |
|
| 10 |
| vulnerability |
VCID-urb1-hv1z-duga |
|
| 11 |
| vulnerability |
VCID-veaw-n6vt-zfgu |
|
| 12 |
| vulnerability |
VCID-x9ee-za9y-3fcb |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:pypi/scrapy@2.5.1 |
|
|
| aliases |
CVE-2021-41125, GHSA-jwqp-28gf-p498, PYSEC-2021-363
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4vw6-u8m8-dbe2 |
|
| 2 |
| url |
VCID-64nx-aruy-q7gy |
| vulnerability_id |
VCID-64nx-aruy-q7gy |
| summary |
A Regular Expression Denial of Service (ReDoS) vulnerability exists in the XMLFeedSpider class of the scrapy/scrapy project, specifically in the parsing of XML content. By crafting malicious XML content that exploits inefficient regular expression complexity used in the parsing process, an attacker can cause a denial-of-service (DoS) condition. This vulnerability allows for the system to hang and consume significant resources, potentially rendering services that utilize Scrapy for XML processing unresponsive. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-1892 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18259 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18106 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18161 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18213 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.1836 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18415 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18118 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18203 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18257 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-1892 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://huntr.com/bounties/271f94f2-1e05-4616-ac43-41752389e26b |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
|
| 2 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-05T16:44:39Z/ |
|
|
| url |
https://huntr.com/bounties/271f94f2-1e05-4616-ac43-41752389e26b |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-1892, GHSA-cc65-xxvf-f7r9, GMS-2024-287, PYSEC-2024-162
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-64nx-aruy-q7gy |
|
| 3 |
| url |
VCID-dc1m-rt7j-w3af |
| vulnerability_id |
VCID-dc1m-rt7j-w3af |
| summary |
Scrapy is vulnerable to a denial of service (DoS) attack due to flaws in brotli decompression implementation
Scrapy versions up to 2.13.3 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression. Mitigation for this vulnerability needs security enhancement added in brotli v1.2.0. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-6176 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08068 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08092 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08047 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08008 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09763 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09633 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09747 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09795 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-6176 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-6176, GHSA-2qfp-q593-8484
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dc1m-rt7j-w3af |
|
| 4 |
| url |
VCID-jvzg-u5ks-tkhd |
| vulnerability_id |
VCID-jvzg-u5ks-tkhd |
| summary |
Cookie-setting is not restricted based on the public suffix list
Responses from domain names whose public domain name suffix contains 1 or more periods (e.g. responses from `example.co.uk`, given its public domain name suffix is `co.uk`) are able to set cookies that are included in requests to any other domain sharing the same domain name suffix. |
| references |
|
| fixed_packages |
| 0 |
| url |
pkg:pypi/scrapy@1.8.2 |
| purl |
pkg:pypi/scrapy@1.8.2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1k4b-pr5k-s7e5 |
|
| 1 |
| vulnerability |
VCID-385b-344t-23es |
|
| 2 |
| vulnerability |
VCID-64nx-aruy-q7gy |
|
| 3 |
| vulnerability |
VCID-dc1m-rt7j-w3af |
|
| 4 |
| vulnerability |
VCID-kgf5-wu3r-pqc6 |
|
| 5 |
| vulnerability |
VCID-m9gg-8qum-9bh2 |
|
| 6 |
| vulnerability |
VCID-nekz-z7zw-mfgz |
|
| 7 |
| vulnerability |
VCID-t5cn-a543-nyag |
|
| 8 |
| vulnerability |
VCID-ugxf-pfaw-rqbm |
|
| 9 |
| vulnerability |
VCID-urb1-hv1z-duga |
|
| 10 |
| vulnerability |
VCID-veaw-n6vt-zfgu |
|
| 11 |
| vulnerability |
VCID-x9ee-za9y-3fcb |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:pypi/scrapy@1.8.2 |
|
| 1 |
| url |
pkg:pypi/scrapy@2.6.0 |
| purl |
pkg:pypi/scrapy@2.6.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1k4b-pr5k-s7e5 |
|
| 1 |
| vulnerability |
VCID-385b-344t-23es |
|
| 2 |
| vulnerability |
VCID-64nx-aruy-q7gy |
|
| 3 |
| vulnerability |
VCID-dc1m-rt7j-w3af |
|
| 4 |
| vulnerability |
VCID-kgf5-wu3r-pqc6 |
|
| 5 |
| vulnerability |
VCID-m9gg-8qum-9bh2 |
|
| 6 |
| vulnerability |
VCID-nekz-z7zw-mfgz |
|
| 7 |
| vulnerability |
VCID-t5cn-a543-nyag |
|
| 8 |
| vulnerability |
VCID-ugxf-pfaw-rqbm |
|
| 9 |
| vulnerability |
VCID-urb1-hv1z-duga |
|
| 10 |
| vulnerability |
VCID-veaw-n6vt-zfgu |
|
| 11 |
| vulnerability |
VCID-x9ee-za9y-3fcb |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:pypi/scrapy@2.6.0 |
|
|
| aliases |
GHSA-mfjm-vh54-3f96, GMS-2022-230
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jvzg-u5ks-tkhd |
|
| 5 |
| url |
VCID-kgf5-wu3r-pqc6 |
| vulnerability_id |
VCID-kgf5-wu3r-pqc6 |
| summary |
Scrapy authorization header leakage on cross-domain redirect
### Impact
When you send a request with the `Authorization` header to one domain, and the response asks to redirect to a different domain, Scrapy’s built-in redirect middleware creates a follow-up redirect request that keeps the original `Authorization` header, leaking its content to that second domain.
The [right behavior](https://fetch.spec.whatwg.org/#ref-for-cors-non-wildcard-request-header-name) would be to drop the `Authorization` header instead, in this scenario.
### Patches
Upgrade to Scrapy 2.11.1.
If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.11.1 is not an option, you may upgrade to Scrapy 1.8.4 instead.
### Workarounds
If you cannot upgrade, make sure that you are not using the `Authentication` header, either directly or through some third-party plugin.
If you need to use that header in some requests, add `"dont_redirect": True` to the `request.meta` dictionary of those requests to disable following redirects for them.
If you need to keep (same domain) redirect support on those requests, make sure you trust the target website not to redirect your requests to a different domain.
### Acknowledgements
This security issue was reported by @ranjit-git [through huntr.com](https://huntr.com/bounties/49974321-2718-43e3-a152-62b16eed72a9/). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-3574 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31352 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31206 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31216 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31259 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31255 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31225 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31311 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31172 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-3574 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-3574, GHSA-cw9j-q3vf-hrrv, GMS-2024-288
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kgf5-wu3r-pqc6 |
|
| 6 |
| url |
VCID-m9gg-8qum-9bh2 |
| vulnerability_id |
VCID-m9gg-8qum-9bh2 |
| summary |
Scrapy 1.4 allows remote attackers to cause a denial of service (memory consumption) via large files because arbitrarily many files are read into memory, which is especially problematic if the files are then individually written in a separate thread to a slow storage resource, as demonstrated by interaction between dataReceived (in core/downloader/handlers/http11.py) and S3FilesStore. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14158 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00505 |
| scoring_system |
epss |
| scoring_elements |
0.66221 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00505 |
| scoring_system |
epss |
| scoring_elements |
0.66111 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00505 |
| scoring_system |
epss |
| scoring_elements |
0.66153 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00505 |
| scoring_system |
epss |
| scoring_elements |
0.66179 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00505 |
| scoring_system |
epss |
| scoring_elements |
0.66149 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00505 |
| scoring_system |
epss |
| scoring_elements |
0.66197 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00505 |
| scoring_system |
epss |
| scoring_elements |
0.6621 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00505 |
| scoring_system |
epss |
| scoring_elements |
0.66229 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00505 |
| scoring_system |
epss |
| scoring_elements |
0.66216 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00505 |
| scoring_system |
epss |
| scoring_elements |
0.66185 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14158 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-14158, GHSA-h7wm-ph43-c39p, PYSEC-2017-83
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m9gg-8qum-9bh2 |
|
| 7 |
| url |
VCID-nekz-z7zw-mfgz |
| vulnerability_id |
VCID-nekz-z7zw-mfgz |
| summary |
Scrapy allows redirect following in protocols other than HTTP
### Impact
Scrapy was following redirects regardless of the URL protocol, so redirects were working for `data://`, `file://`, `ftp://`, `s3://`, and any other scheme defined in the `DOWNLOAD_HANDLERS` setting.
However, HTTP redirects should only work between URLs that use the `http://` or `https://` schemes.
A malicious actor, given write access to the start requests (e.g. ability to define `start_urls`) of a spider and read access to the spider output, could exploit this vulnerability to:
- Redirect to any local file using the `file://` scheme to read its contents.
- Redirect to an `ftp://` URL of a malicious FTP server to obtain the FTP username and password configured in the spider or project.
- Redirect to any `s3://` URL to read its content using the S3 credentials configured in the spider or project.
For `file://` and `s3://`, how the spider implements its parsing of input data into an output item determines what data would be vulnerable. A spider that always outputs the entire contents of a response would be completely vulnerable, while a spider that extracted only fragments from the response could significantly limit vulnerable data.
### Patches
Upgrade to Scrapy 2.11.2.
### Workarounds
Replace the built-in retry middlewares (`RedirectMiddleware` and `MetaRefreshMiddleware`) with custom ones that implement the fix from Scrapy 2.11.2, and verify that they work as intended.
### References
This security issue was reported by @mvsantos at https://github.com/scrapy/scrapy/issues/457. |
| references |
|
| fixed_packages |
|
| aliases |
GHSA-23j4-mw76-5v7h
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nekz-z7zw-mfgz |
|
| 8 |
| url |
VCID-t5cn-a543-nyag |
| vulnerability_id |
VCID-t5cn-a543-nyag |
| summary |
Duplicate Advisory: Scrapy leaks the authorization header on same-domain but cross-origin redirects
## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-4qqq-9vqf-3h3f. This link is maintained to preserve external references.
## Original Description
In scrapy/scrapy, an issue was identified where the Authorization header is not removed during redirects that only change the scheme (e.g., HTTPS to HTTP) but remain within the same domain. This behavior contravenes the Fetch standard, which mandates the removal of Authorization headers in cross-origin requests when the scheme, host, or port changes. Consequently, when a redirect downgrades from HTTPS to HTTP, the Authorization header may be inadvertently exposed in plaintext, leading to potential sensitive information disclosure to unauthorized actors. The flaw is located in the _build_redirect_request function of the redirect middleware. |
| references |
|
| fixed_packages |
|
| aliases |
GHSA-cg34-w3fm-82h3
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t5cn-a543-nyag |
|
| 9 |
| url |
VCID-ugxf-pfaw-rqbm |
| vulnerability_id |
VCID-ugxf-pfaw-rqbm |
| summary |
Scrapy before 2.6.2 and 1.8.3 vulnerable to one proxy sending credentials to another
### Impact
When the [built-in HTTP proxy downloader middleware](https://docs.scrapy.org/en/2.6/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpproxy) processes a request with `proxy` metadata, and that `proxy` metadata includes proxy credentials, the built-in HTTP proxy downloader middleware sets the `Proxy-Authentication` header, but only if that header is not already set.
There are third-party proxy-rotation downloader middlewares that set different `proxy` metadata every time they process a request.
Because of request retries and redirects, the same request can be processed by downloader middlewares more than once, including both the built-in HTTP proxy downloader middleware and any third-party proxy-rotation downloader middleware.
These third-party proxy-rotation downloader middlewares could change the `proxy` metadata of a request to a new value, but fail to remove the `Proxy-Authentication` header from the previous value of the `proxy` metadata, causing the credentials of one proxy to be leaked to a different proxy.
If you rotate proxies from different proxy providers, and any of those proxies requires credentials, you are affected, unless you are handling proxy rotation as described under **Workarounds** below. If you use a third-party downloader middleware for proxy rotation, the same applies to that downloader middleware, and installing a patched version of Scrapy may not be enough; patching that downloader middlware may be necessary as well.
### Patches
Upgrade to Scrapy 2.6.2.
If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.6.2 is not an option, you may upgrade to Scrapy 1.8.3 instead.
### Workarounds
If you cannot upgrade, make sure that any code that changes the value of the `proxy` request meta also removes the `Proxy-Authorization` header from the request if present.
### For more information
If you have any questions or comments about this advisory:
* [Open an issue](https://github.com/scrapy/scrapy/issues)
* [Email us](mailto:opensource@zyte.com) |
| references |
|
| fixed_packages |
| 0 |
| url |
pkg:pypi/scrapy@1.8.3 |
| purl |
pkg:pypi/scrapy@1.8.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1k4b-pr5k-s7e5 |
|
| 1 |
| vulnerability |
VCID-385b-344t-23es |
|
| 2 |
| vulnerability |
VCID-64nx-aruy-q7gy |
|
| 3 |
| vulnerability |
VCID-dc1m-rt7j-w3af |
|
| 4 |
| vulnerability |
VCID-kgf5-wu3r-pqc6 |
|
| 5 |
| vulnerability |
VCID-nekz-z7zw-mfgz |
|
| 6 |
| vulnerability |
VCID-t5cn-a543-nyag |
|
| 7 |
| vulnerability |
VCID-urb1-hv1z-duga |
|
| 8 |
| vulnerability |
VCID-veaw-n6vt-zfgu |
|
| 9 |
| vulnerability |
VCID-x9ee-za9y-3fcb |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:pypi/scrapy@1.8.3 |
|
| 1 |
|
|
| aliases |
GHSA-9x8m-2xpf-crp3, GMS-2022-3357
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ugxf-pfaw-rqbm |
|
| 10 |
| url |
VCID-urb1-hv1z-duga |
| vulnerability_id |
VCID-urb1-hv1z-duga |
| summary |
In scrapy/scrapy, an issue was identified where the Authorization header is not removed during redirects that only change the scheme (e.g., HTTPS to HTTP) but remain within the same domain. This behavior contravenes the Fetch standard, which mandates the removal of Authorization headers in cross-origin requests when the scheme, host, or port changes. Consequently, when a redirect downgrades from HTTPS to HTTP, the Authorization header may be inadvertently exposed in plaintext, leading to potential sensitive information disclosure to unauthorized actors. The flaw is located in the _build_redirect_request function of the redirect middleware. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-1968 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40912 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40928 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40886 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40905 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40923 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40917 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40868 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40939 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40941 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-1968 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:pypi/scrapy@2.0.0 |
| purl |
pkg:pypi/scrapy@2.0.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1k4b-pr5k-s7e5 |
|
| 1 |
| vulnerability |
VCID-385b-344t-23es |
|
| 2 |
| vulnerability |
VCID-4vw6-u8m8-dbe2 |
|
| 3 |
| vulnerability |
VCID-64nx-aruy-q7gy |
|
| 4 |
| vulnerability |
VCID-dc1m-rt7j-w3af |
|
| 5 |
| vulnerability |
VCID-jvzg-u5ks-tkhd |
|
| 6 |
| vulnerability |
VCID-kgf5-wu3r-pqc6 |
|
| 7 |
| vulnerability |
VCID-m9gg-8qum-9bh2 |
|
| 8 |
| vulnerability |
VCID-nekz-z7zw-mfgz |
|
| 9 |
| vulnerability |
VCID-t5cn-a543-nyag |
|
| 10 |
| vulnerability |
VCID-ugxf-pfaw-rqbm |
|
| 11 |
| vulnerability |
VCID-urb1-hv1z-duga |
|
| 12 |
| vulnerability |
VCID-veaw-n6vt-zfgu |
|
| 13 |
| vulnerability |
VCID-x9ee-za9y-3fcb |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:pypi/scrapy@2.0.0 |
|
| 1 |
|
|
| aliases |
CVE-2024-1968, GHSA-4qqq-9vqf-3h3f, PYSEC-2024-258
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-urb1-hv1z-duga |
|
| 11 |
| url |
VCID-veaw-n6vt-zfgu |
| vulnerability_id |
VCID-veaw-n6vt-zfgu |
| summary |
Scrapy's redirects ignoring scheme-specific proxy settings
### Impact
When using system proxy settings, which are scheme-specific (i.e. specific to `http://` or `https://` URLs), Scrapy was not accounting for scheme changes during redirects.
For example, an HTTP request would use the proxy configured for HTTP and, when redirected to an HTTPS URL, the new HTTPS request would still use the proxy configured for HTTP instead of switching to the proxy configured for HTTPS. Same the other way around.
If you have different proxy configurations for HTTP and HTTPS in your system for security reasons (e.g., maybe you don’t want one of your proxy providers to be aware of the URLs that you visit with the other one), this would be a security issue.
### Patches
Upgrade to Scrapy 2.11.2.
### Workarounds
Replace the built-in retry middlewares (`RedirectMiddleware` and `MetaRefreshMiddleware`) and the `HttpProxyMiddleware` middleware with custom ones that implement the fix from Scrapy 2.11.2, and verify that they work as intended.
### References
This security issue was reported by @redapple at https://github.com/scrapy/scrapy/issues/767. |
| references |
|
| fixed_packages |
|
| aliases |
GHSA-jm3v-qxmh-hxwv
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-veaw-n6vt-zfgu |
|
| 12 |
| url |
VCID-x9ee-za9y-3fcb |
| vulnerability_id |
VCID-x9ee-za9y-3fcb |
| summary |
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository scrapy/scrapy prior to 2.6.1. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0577 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43301 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43375 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43323 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43385 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43358 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43422 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43363 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43378 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.4341 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.4339 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0577 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:pypi/scrapy@1.8.2 |
| purl |
pkg:pypi/scrapy@1.8.2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1k4b-pr5k-s7e5 |
|
| 1 |
| vulnerability |
VCID-385b-344t-23es |
|
| 2 |
| vulnerability |
VCID-64nx-aruy-q7gy |
|
| 3 |
| vulnerability |
VCID-dc1m-rt7j-w3af |
|
| 4 |
| vulnerability |
VCID-kgf5-wu3r-pqc6 |
|
| 5 |
| vulnerability |
VCID-m9gg-8qum-9bh2 |
|
| 6 |
| vulnerability |
VCID-nekz-z7zw-mfgz |
|
| 7 |
| vulnerability |
VCID-t5cn-a543-nyag |
|
| 8 |
| vulnerability |
VCID-ugxf-pfaw-rqbm |
|
| 9 |
| vulnerability |
VCID-urb1-hv1z-duga |
|
| 10 |
| vulnerability |
VCID-veaw-n6vt-zfgu |
|
| 11 |
| vulnerability |
VCID-x9ee-za9y-3fcb |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:pypi/scrapy@1.8.2 |
|
| 1 |
| url |
pkg:pypi/scrapy@2.6.1 |
| purl |
pkg:pypi/scrapy@2.6.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1k4b-pr5k-s7e5 |
|
| 1 |
| vulnerability |
VCID-385b-344t-23es |
|
| 2 |
| vulnerability |
VCID-64nx-aruy-q7gy |
|
| 3 |
| vulnerability |
VCID-dc1m-rt7j-w3af |
|
| 4 |
| vulnerability |
VCID-kgf5-wu3r-pqc6 |
|
| 5 |
| vulnerability |
VCID-m9gg-8qum-9bh2 |
|
| 6 |
| vulnerability |
VCID-nekz-z7zw-mfgz |
|
| 7 |
| vulnerability |
VCID-t5cn-a543-nyag |
|
| 8 |
| vulnerability |
VCID-ugxf-pfaw-rqbm |
|
| 9 |
| vulnerability |
VCID-urb1-hv1z-duga |
|
| 10 |
| vulnerability |
VCID-veaw-n6vt-zfgu |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:pypi/scrapy@2.6.1 |
|
|
| aliases |
CVE-2022-0577, GHSA-cjvr-mfj7-j4j8, PYSEC-2022-159
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x9ee-za9y-3fcb |
|
|