


Perceptive Security
SOC/SIEM Consultancy

multipart is a fast multipart/form-data parser for python. Prior to 1.2.2, 1.3.1 and 1.4.0-dev, the parse_options_header() function in multipart.py uses a regul…
Published:
11 maart 2026 om 23:00:00
Alert date:
12 maart 2026 om 22:25:09
Source:
nvd.nist.gov
Web Technologies, Supply Chain & Dependencies
The Python multipart library contains a Regular Expression Denial of Service (ReDoS) vulnerability in versions prior to 1.2.2, 1.3.1, and 1.4.0-dev. The parse_options_header() function uses a regex with ambiguous alternation that causes exponential backtracking when parsing malicious HTTP or multipart headers. This vulnerability can be exploited to perform denial of service attacks against web applications that use this library for parsing request headers or multipart/form-data streams. The issue has been patched in the specified versions.
Technical details
Mitigation steps:
Affected products:
Python multipart library
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-28356
https://github.com/defnull/multipart/security/advisories/GHSA-p2m9-wcp5-6qw3
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
