Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.1
Python 3.12 Command-Line Risk: Malicious URLs Can Hijack Browser
RLSA-2026:6283
Summary
A security update is available for Python 3.12 to prevent malicious websites from tricking users into opening unwanted or malicious links in their web browsers. This update fixes a vulnerability that could allow hackers to inject commands into URLs, potentially leading to security issues. Business owners should update their Python installations to the latest version to ensure they are protected.
What to do
- Update python3.12 to version 0:3.12.12-4.el8_10.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | python3.12 | <= 0:3.12.12-4.el8_10 | 0:3.12.12-4.el8_10 |
Original title
Important: python3.12 security update
Original description
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Python: Command-line option injection in webbrowser.open() via crafted URLs (CVE-2026-4519)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Security Fix(es):
* python: Python: Command-line option injection in webbrowser.open() via crafted URLs (CVE-2026-4519)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
osv CVSS3.1
7.1
- https://errata.rockylinux.org/RLSA-2026:6283 Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2449649 Third Party Advisory
Published: 7 Apr 2026 · Updated: 7 Apr 2026 · First seen: 7 Apr 2026