{"id":"ALPINE-CVE-2026-25645","details":"Requests is a HTTP library. Prior to version 2.33.0, the `requests.utils.extract_zipped_paths()` utility function uses a predictable filename when extracting files from zip archives into the system temporary directory. If the target file already exists, it is reused without validation. A local attacker with write access to the temp directory could pre-create a malicious file that would be loaded in place of the legitimate one. Standard usage of the Requests library is not affected by this vulnerability. Only applications that call `extract_zipped_paths()` directly are impacted. Starting in version 2.33.0, the library extracts files to a non-deterministic location. If developers are unable to upgrade, they can set `TMPDIR` in their environment to a directory with restricted write access.","modified":"2026-04-28T07:31:04.856353Z","published":"2026-03-25T17:16:52.970Z","upstream":["CVE-2026-25645"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2026-25645"}],"affected":[{"package":{"name":"py3-requests","ecosystem":"Alpine:v3.23","purl":"pkg:apk/alpine/py3-requests?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.33.1-r0"}]}],"versions":["1.0.4-r0","1.1.0-r0","1.2.3-r0","2.0.0-r0","2.10.0-r0","2.11.0-r0","2.11.1-r0","2.11.1-r1","2.12.4-r0","2.12.4-r1","2.13.0-r0","2.16.5-r0","2.17.3-r0","2.18.1-r0","2.18.1-r1","2.18.2-r0","2.18.3-r0","2.18.4-r0","2.19.1-r0","2.21.0-r0","2.21.0-r1","2.21.0-r2","2.21.0-r3","2.21.0-r4","2.21.0-r5","2.21.0-r6","2.22.0-r0","2.22.0-r1","2.23.0-r0","2.24.0-r0","2.24.0-r1","2.24.0-r2","2.24.0-r3","2.25.0-r0","2.25.0-r1","2.25.1-r0","2.25.1-r1","2.25.1-r2","2.25.1-r3","2.25.1-r4","2.26.0-r0","2.26.0-r1","2.26.0-r2","2.27.1-r0","2.28.1-r0","2.28.1-r1","2.28.1-r2","2.28.2-r0","2.28.2-r1","2.29.0-r0","2.3.0-r0","2.30.0-r0","2.31.0-r0","2.31.0-r1","2.31.0-r2","2.32.2-r0","2.32.3-r0","2.32.4-r0","2.32.5-r0","2.4.3-r0","2.5.1-r0","2.5.2-r0","2.6.0-r0","2.7.0-r0","2.8.1-r0","2.9.1-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2026-25645.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}]}