VYPR
Low severity3.3NVD Advisory· Published Mar 20, 2026· Updated Apr 16, 2026

CVE-2026-4519

CVE-2026-4519

Description

The webbrowser.open() API would accept leading dashes in the URL which could be handled as command line options for certain web browsers. New behavior rejects leading dashes. Users are recommended to sanitize URLs prior to passing to webbrowser.open().

Affected products

8
  • cpe:2.3:a:python:python:*:*:*:*:*:*:*:*+ 7 more
    • cpe:2.3:a:python:python:*:*:*:*:*:*:*:*range: <3.13.13
    • cpe:2.3:a:python:python:3.15.0:alpha1:*:*:*:*:*:*
    • cpe:2.3:a:python:python:3.15.0:alpha2:*:*:*:*:*:*
    • cpe:2.3:a:python:python:3.15.0:alpha3:*:*:*:*:*:*
    • cpe:2.3:a:python:python:3.15.0:alpha4:*:*:*:*:*:*
    • cpe:2.3:a:python:python:3.15.0:alpha5:*:*:*:*:*:*
    • cpe:2.3:a:python:python:3.15.0:alpha6:*:*:*:*:*:*
    • cpe:2.3:a:python:python:3.15.0:alpha7:*:*:*:*:*:*

Patches

12

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

16

News mentions

0

No linked articles in our index yet.