CVE-2026-27448

Source
https://cve.org/CVERecord?id=CVE-2026-27448
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-27448.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-27448
Aliases
Downstream
Related
Published
2026-03-17T23:24:30.661Z
Modified
2026-05-18T05:58:40.255361444Z
Severity
  • 1.7 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U CVSS Calculator
Summary
pyOpenSSL allows TLS connection bypass via unhandled callback exception in set_tlsext_servername_callback
Details

pyOpenSSL is a Python wrapper around the OpenSSL library. Starting in version 0.14.0 and prior to version 26.0.0, if a user provided callback to set_tlsext_servername_callback raised an unhandled exception, this would result in a connection being accepted. If a user was relying on this callback for any security-sensitive behavior, this could allow bypassing it. Starting in version 26.0.0, unhandled exceptions now result in rejecting the connection.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27448.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-636"
    ]
}
References

Affected packages

Git / github.com/pyca/pyopenssl

Affected ranges

Type
GIT
Repo
https://github.com/pyca/pyopenssl
Events

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-27448.json"