Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.1
Python 3.11: Malicious URLs Can Execute Code
RLSA-2026:6281
Summary
A security update is available for Python 3.11 to prevent malicious URLs from executing code on your system. This issue affects anyone using Python 3.11 to open URLs from the command line. To stay secure, update your Python installation to the latest version.
What to do
- Update python3.11 to version 0:3.11.13-6.el8_10.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | python3.11 | <= 0:3.11.13-6.el8_10 | 0:3.11.13-6.el8_10 |
Original title
Important: python3.11 security update
Original description
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Python: Command-line option injection in webbrowser.open() via crafted URLs (CVE-2026-4519)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Security Fix(es):
* python: Python: Command-line option injection in webbrowser.open() via crafted URLs (CVE-2026-4519)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
osv CVSS3.1
7.1
- https://errata.rockylinux.org/RLSA-2026:6281 Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2449649 Third Party Advisory
Published: 7 Apr 2026 · Updated: 7 Apr 2026 · First seen: 7 Apr 2026