Skip to content

fix(deps): update dependency requests to v2.33.0 [security]#371

Open
renovate[bot] wants to merge 1 commit intomainfrom
renovate/pypi-requests-vulnerability
Open

fix(deps): update dependency requests to v2.33.0 [security]#371
renovate[bot] wants to merge 1 commit intomainfrom
renovate/pypi-requests-vulnerability

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate bot commented Jun 10, 2025

This PR contains the following updates:

Package Change Age Confidence
requests (changelog) 2.32.32.33.0 age confidence

Review

  • Updates have been tested and work
  • If updates are AWS related, versions match the infrastructure (e.g. Lambda runtime, database, etc.)

GitHub Vulnerability Alerts

CVE-2024-47081

Impact

Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs.

Workarounds

For older versions of Requests, use of the .netrc file can be disabled with trust_env=False on your Requests Session (docs).

References

https://github.com/psf/requests/pull/6965
https://seclists.org/fulldisclosure/2025/Jun/2

CVE-2026-25645

Impact

The requests.utils.extract_zipped_paths() utility function uses a predictable filename when extracting files from zip archives into the system temporary directory. If the target file already exists, it is reused without validation. A local attacker with write access to the temp directory could pre-create a malicious file that would be loaded in place of the legitimate one.

Affected usages

Standard usage of the Requests library is not affected by this vulnerability. Only applications that call extract_zipped_paths() directly are impacted.

Remediation

Upgrade to at least Requests 2.33.0, where the library now extracts files to a non-deterministic location.

If developers are unable to upgrade, they can set TMPDIR in their environment to a directory with restricted write access.


Requests vulnerable to .netrc credentials leak via malicious URLs

CVE-2024-47081 / GHSA-9hjg-9r4m-mvj7

More information

Details

Impact

Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs.

Workarounds

For older versions of Requests, use of the .netrc file can be disabled with trust_env=False on your Requests Session (docs).

References

https://github.com/psf/requests/pull/6965
https://seclists.org/fulldisclosure/2025/Jun/2

Severity

  • CVSS Score: 5.3 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Requests has Insecure Temp File Reuse in its extract_zipped_paths() utility function

CVE-2026-25645 / GHSA-gc5v-m9x4-r6x2

More information

Details

Impact

The requests.utils.extract_zipped_paths() utility function uses a predictable filename when extracting files from zip archives into the system temporary directory. If the target file already exists, it is reused without validation. A local attacker with write access to the temp directory could pre-create a malicious file that would be loaded in place of the legitimate one.

Affected usages

Standard usage of the Requests library is not affected by this vulnerability. Only applications that call extract_zipped_paths() directly are impacted.

Remediation

Upgrade to at least Requests 2.33.0, where the library now extracts files to a non-deterministic location.

If developers are unable to upgrade, they can set TMPDIR in their environment to a directory with restricted write access.

Severity

  • CVSS Score: 4.4 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Release Notes

psf/requests (requests)

v2.33.0

Compare Source

Announcements

  • 📣 Requests is adding inline types. If you have a typed code base that
    uses Requests, please take a look at #​7271. Give it a try, and report
    any gaps or feedback you may have in the issue. 📣

Security

  • CVE-2026-25645 requests.utils.extract_zipped_paths now extracts
    contents to a non-deterministic location to prevent malicious file
    replacement. This does not affect default usage of Requests, only
    applications calling the utility function directly.

Improvements

  • Migrated to a PEP 517 build system using setuptools. (#​7012)

Bugfixes

  • Fixed an issue where an empty netrc entry could cause
    malformed authentication to be applied to Requests on
    Python 3.11+. (#​7205)

Deprecations

  • Dropped support for Python 3.9 following its end of support. (#​7196)

Documentation

  • Various typo fixes and doc improvements.

v2.32.5

Compare Source

Bugfixes

  • The SSLContext caching feature originally introduced in 2.32.0 has created
    a new class of issues in Requests that have had negative impact across a number
    of use cases. The Requests team has decided to revert this feature as long term
    maintenance of it is proving to be unsustainable in its current iteration.

Deprecations

  • Added support for Python 3.14.
  • Dropped support for Python 3.8 following its end of support.

v2.32.4

Compare Source

Security

  • CVE-2024-47081 Fixed an issue where a maliciously crafted URL and trusted
    environment will retrieve credentials for the wrong hostname/machine from a
    netrc file.

Improvements

  • Numerous documentation improvements

Deprecations

  • Added support for pypy 3.11 for Linux and macOS.
  • Dropped support for pypy 3.9 following its end of support.

Configuration

📅 Schedule: Branch creation - "" in timezone America/Montreal, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch from c120aa9 to 38bb897 Compare June 12, 2025 17:59
@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch from 38bb897 to ff42ad0 Compare June 24, 2025 20:44
@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch 2 times, most recently from 2f8a044 to 04e46ab Compare September 3, 2025 14:53
@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch 2 times, most recently from 223cfce to 2618da9 Compare September 16, 2025 19:53
@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch from 2618da9 to a6db1b6 Compare October 15, 2025 19:21
@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch from a6db1b6 to 9d5dbc1 Compare November 5, 2025 14:38
@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch 2 times, most recently from 1755ac5 to 1bfd4ad Compare November 18, 2025 15:36
@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch 2 times, most recently from ebb0fcc to 58ddfb8 Compare November 25, 2025 18:56
@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch 3 times, most recently from 532fbec to 958860c Compare December 8, 2025 16:25
@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch from 958860c to f8705db Compare January 26, 2026 20:04
@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch 3 times, most recently from 1c64fd6 to d71b023 Compare February 11, 2026 19:19
@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch from d71b023 to 9790a83 Compare February 25, 2026 20:12
@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch 4 times, most recently from 8661fb5 to b5281cc Compare March 11, 2026 20:52
@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch 3 times, most recently from 9eb2947 to adc98cd Compare March 18, 2026 19:48
@renovate renovate bot changed the title fix(deps): update dependency requests to v2.32.4 [security] fix(deps): update dependency requests to v2.33.0 [security] Mar 25, 2026
@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch 2 times, most recently from 6c68c39 to 852c041 Compare March 31, 2026 20:26
@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch from 852c041 to 1f3a204 Compare March 31, 2026 20:29
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants