fix: upgrade requests to 2.33.0 to address CVE-2026-25645#172
Closed
lfarrel6 wants to merge 2 commits into
Closed
Conversation
|
aNickPlx
approved these changes
May 22, 2026
Member
Author
|
Addressed in #173 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Linear Issue
COM-122
CVE Summary
CVE-2026-25645 —
requestsPredictable Temp File Extractionrequests.utils.extract_zipped_paths()extracts files from ZIP archives into the system temp directory using a predictable filename. If that file already exists it is silently reused with no integrity check, allowing a local attacker who can write to/tmpto pre-plant a malicious file and have it loaded in place of a legitimate certificate bundle or resource.Vulnerability Details
Risk Assessment
Risk is very low. The codebase uses
requestsonly for standard HTTP operations and does not directly callextract_zipped_paths(). However, the dependency must still be upgraded to clear the Dependabot alert and satisfy the SLA deadline.Changes
requestsconstraint inpyproject.tomlfrom^2.32.4to^2.33.0poetry.lockwithrequestsupgraded to 2.34.2Testing
✅ All core tests pass
✅ No direct calls to
extract_zipped_paths()found in codebase✅ Compatible with existing test dependencies (
requests-mock,responses)