Skip to content

python_dotenv-0.21.1-py3-none-any.whl: 1 vulnerabilities (highest severity is: 6.6) #35

@mend-for-github-com

Description

@mend-for-github-com
Vulnerable Library - python_dotenv-0.21.1-py3-none-any.whl

Read key-value pairs from a .env file and set them as environment variables

Library home page: https://files.pythonhosted.org/packages/64/62/f19d1e9023aacb47241de3ab5a5d5fedf32c78a71a9e365bb2153378c141/python_dotenv-0.21.1-py3-none-any.whl

Path to dependency file: /requirements.txt

Path to vulnerable library: /requirements.txt

Vulnerabilities

Vulnerability Severity CVSS Dependency Type Fixed in (python_dotenv version) Remediation Possible**
CVE-2026-28684 Medium 6.6 python_dotenv-0.21.1-py3-none-any.whl Direct 1.2.2

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2026-28684

Vulnerable Library - python_dotenv-0.21.1-py3-none-any.whl

Read key-value pairs from a .env file and set them as environment variables

Library home page: https://files.pythonhosted.org/packages/64/62/f19d1e9023aacb47241de3ab5a5d5fedf32c78a71a9e365bb2153378c141/python_dotenv-0.21.1-py3-none-any.whl

Path to dependency file: /requirements.txt

Path to vulnerable library: /requirements.txt

Dependency Hierarchy:

  • python_dotenv-0.21.1-py3-none-any.whl (Vulnerable Library)

Found in base branch: main

Vulnerability Details

python-dotenv reads key-value pairs from a .env file and can set them as environment variables. Prior to version 1.2.2, "set_key()" and "unset_key()" in python-dotenv follow symbolic links when rewriting ".env" files, allowing a local attacker to overwrite arbitrary files via a crafted symlink when a cross-device rename fallback is triggered. Users should upgrade to v.1.2.2 or, as a workaround, apply the patch manually.

Publish Date: 2026-04-20

URL: CVE-2026-28684

CVSS 3 Score Details (6.6)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-mf9w-mj56-hr94

Release Date: 2026-04-20

Fix Resolution: 1.2.2

⛑️ Automatic Remediation will be attempted for this issue.


⛑️Automatic Remediation will be attempted for this issue.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions