Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/python-scrapy@2.12.0-2?distro=trixie
purl pkg:deb/debian/python-scrapy@2.12.0-2?distro=trixie
Next non-vulnerable version 2.13.4-1
Latest non-vulnerable version 2.14.2-1
Risk 4.0
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-dc1m-rt7j-w3af
Aliases:
CVE-2025-6176
GHSA-2qfp-q593-8484
Scrapy is vulnerable to a denial of service (DoS) attack due to flaws in brotli decompression implementation Scrapy versions up to 2.13.3 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression. Mitigation for this vulnerability needs security enhancement added in brotli v1.2.0.
2.13.4-1
Affected by 0 other vulnerabilities.
2.14.2-1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (6)
Vulnerability Summary Aliases
VCID-385b-344t-23es Scrapy decompression bomb vulnerability ### Impact Scrapy limits allowed response sizes by default through the [`DOWNLOAD_MAXSIZE`](https://docs.scrapy.org/en/latest/topics/settings.html#download-maxsize) and [`DOWNLOAD_WARNSIZE`](https://docs.scrapy.org/en/latest/topics/settings.html#download-warnsize) settings. However, those limits were only being enforced during the download of the raw, usually-compressed response bodies, and not during decompression, making Scrapy vulnerable to [decompression bombs](https://cwe.mitre.org/data/definitions/409.html). A malicious website being scraped could send a small response that, on decompression, could exhaust the memory available to the Scrapy process, potentially affecting any other process sharing that memory, and affecting disk usage in case of uncompressed response caching. ### Patches Upgrade to Scrapy 2.11.1. If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.11.1 is not an option, you may upgrade to Scrapy 1.8.4 instead. ### Workarounds There is no easy workaround. Disabling HTTP decompression altogether is impractical, as HTTP compression is a rather common practice. However, it is technically possible to manually backport the 2.11.1 or 1.8.4 fix, replacing the corresponding components of an unpatched version of Scrapy with patched versions copied into your own code. ### Acknowledgements This security issue was reported by @dmandefy [through huntr.com](https://huntr.com/bounties/c4a0fac9-0c5a-4718-9ee4-2d06d58adabb/). CVE-2024-3572
GHSA-7j7m-v7m3-jqm7
GMS-2024-327
VCID-4vw6-u8m8-dbe2 Scrapy is a high-level web crawling and scraping framework for Python. If you use `HttpAuthMiddleware` (i.e. the `http_user` and `http_pass` spider attributes) for HTTP authentication, all requests will expose your credentials to the request target. This includes requests generated by Scrapy components, such as `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`, or as requests reached through redirects. Upgrade to Scrapy 2.5.1 and use the new `http_auth_domain` spider attribute to control which domains are allowed to receive the configured HTTP authentication credentials. If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.5.1 is not an option, you may upgrade to Scrapy 1.8.1 instead. If you cannot upgrade, set your HTTP authentication credentials on a per-request basis, using for example the `w3lib.http.basic_auth_header` function to convert your credentials into a value that you can assign to the `Authorization` header of your request, instead of defining your credentials globally using `HttpAuthMiddleware`. CVE-2021-41125
GHSA-jwqp-28gf-p498
PYSEC-2021-363
VCID-64nx-aruy-q7gy A Regular Expression Denial of Service (ReDoS) vulnerability exists in the XMLFeedSpider class of the scrapy/scrapy project, specifically in the parsing of XML content. By crafting malicious XML content that exploits inefficient regular expression complexity used in the parsing process, an attacker can cause a denial-of-service (DoS) condition. This vulnerability allows for the system to hang and consume significant resources, potentially rendering services that utilize Scrapy for XML processing unresponsive. CVE-2024-1892
GHSA-cc65-xxvf-f7r9
GMS-2024-287
PYSEC-2024-162
VCID-kgf5-wu3r-pqc6 Scrapy authorization header leakage on cross-domain redirect ### Impact When you send a request with the `Authorization` header to one domain, and the response asks to redirect to a different domain, Scrapy’s built-in redirect middleware creates a follow-up redirect request that keeps the original `Authorization` header, leaking its content to that second domain. The [right behavior](https://fetch.spec.whatwg.org/#ref-for-cors-non-wildcard-request-header-name) would be to drop the `Authorization` header instead, in this scenario. ### Patches Upgrade to Scrapy 2.11.1. If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.11.1 is not an option, you may upgrade to Scrapy 1.8.4 instead. ### Workarounds If you cannot upgrade, make sure that you are not using the `Authentication` header, either directly or through some third-party plugin. If you need to use that header in some requests, add `"dont_redirect": True` to the `request.meta` dictionary of those requests to disable following redirects for them. If you need to keep (same domain) redirect support on those requests, make sure you trust the target website not to redirect your requests to a different domain. ### Acknowledgements This security issue was reported by @ranjit-git [through huntr.com](https://huntr.com/bounties/49974321-2718-43e3-a152-62b16eed72a9/). CVE-2024-3574
GHSA-cw9j-q3vf-hrrv
GMS-2024-288
VCID-urb1-hv1z-duga In scrapy/scrapy, an issue was identified where the Authorization header is not removed during redirects that only change the scheme (e.g., HTTPS to HTTP) but remain within the same domain. This behavior contravenes the Fetch standard, which mandates the removal of Authorization headers in cross-origin requests when the scheme, host, or port changes. Consequently, when a redirect downgrades from HTTPS to HTTP, the Authorization header may be inadvertently exposed in plaintext, leading to potential sensitive information disclosure to unauthorized actors. The flaw is located in the _build_redirect_request function of the redirect middleware. CVE-2024-1968
GHSA-4qqq-9vqf-3h3f
PYSEC-2024-258
VCID-x9ee-za9y-3fcb Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository scrapy/scrapy prior to 2.6.1. CVE-2022-0577
GHSA-cjvr-mfj7-j4j8
PYSEC-2022-159

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:48:59.329363+00:00 Debian Importer Fixing VCID-4vw6-u8m8-dbe2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:57:17.294003+00:00 Debian Importer Fixing VCID-x9ee-za9y-3fcb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:47:34.653955+00:00 Debian Importer Fixing VCID-4vw6-u8m8-dbe2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:40:01.546179+00:00 Debian Importer Fixing VCID-x9ee-za9y-3fcb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:50:53.965289+00:00 Debian Importer Affected by VCID-dc1m-rt7j-w3af https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:53.942994+00:00 Debian Importer Fixing VCID-kgf5-wu3r-pqc6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:53.894710+00:00 Debian Importer Fixing VCID-385b-344t-23es https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:53.846728+00:00 Debian Importer Fixing VCID-urb1-hv1z-duga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:53.796170+00:00 Debian Importer Fixing VCID-64nx-aruy-q7gy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:53.741878+00:00 Debian Importer Fixing VCID-x9ee-za9y-3fcb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:53.690620+00:00 Debian Importer Fixing VCID-4vw6-u8m8-dbe2 https://security-tracker.debian.org/tracker/data/json 38.1.0