CVE-2025-22153

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-22153
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-22153.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-22153
Aliases
Downstream
Published
2025-01-23T17:34:27Z
Modified
2025-10-30T20:31:51.448829Z
Severity
  • 7.9 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L CVSS Calculator
Summary
try/except* clauses could allow bypass RestrictedPython via type confusion bug in the CPython interpreter
Details

RestrictedPython is a tool that helps to define a subset of the Python language which allows to provide a program input into a trusted environment. Via a type confusion bug in versions of the CPython interpreter starting in 3.11 and prior to 3.13.2 when using try/except*, RestrictedPython starting in version 6.0 and prior to version 8.0 could be bypassed. The issue is patched in version 8.0 of RestrictedPython by removing support for try/except* clauses. No known workarounds are available.

Database specific
{
    "cwe_ids": [
        "CWE-843"
    ]
}
References

Affected packages

Git / github.com/zopefoundation/restrictedpython

Affected ranges

Type
GIT
Repo
https://github.com/zopefoundation/restrictedpython
Events

Affected versions

6.*

6.0

7.*

7.0
7.0a1.dev0
7.0a1.dev1
7.0a2.dev0
7.1
7.2
7.2a1.dev0
7.3
7.4