Skip to content

python_dotenv-1.2.1-py3-none-any.whl: 1 vulnerabilities (highest severity is: 6.6) #253

@mend-for-github-com

Description

@mend-for-github-com
Vulnerable Library - python_dotenv-1.2.1-py3-none-any.whl

Read key-value pairs from a .env file and set them as environment variables

Library home page: https://files.pythonhosted.org/packages/14/1b/a298b06749107c305e1fe0f814c6c74aea7b2f1e10989cb30f544a1b3253/python_dotenv-1.2.1-py3-none-any.whl

Path to dependency file: /requirements.txt

Path to vulnerable library: /tmp/ws-ua_20260414115749_FASALT/python_KPPKZR/202604141157501/env/lib/python3.9/site-packages/python_dotenv-1.2.1.dist-info

Vulnerabilities

Vulnerability Severity CVSS Exploit Maturity EPSS Dependency Type Fixed in (python_dotenv version) Remediation Possible** Reachability
CVE-2026-28684 Medium 6.6 Not Defined 0.0% python_dotenv-1.2.1-py3-none-any.whl Direct 1.2.2

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2026-28684

Vulnerable Library - python_dotenv-1.2.1-py3-none-any.whl

Read key-value pairs from a .env file and set them as environment variables

Library home page: https://files.pythonhosted.org/packages/14/1b/a298b06749107c305e1fe0f814c6c74aea7b2f1e10989cb30f544a1b3253/python_dotenv-1.2.1-py3-none-any.whl

Path to dependency file: /requirements.txt

Path to vulnerable library: /tmp/ws-ua_20260414115749_FASALT/python_KPPKZR/202604141157501/env/lib/python3.9/site-packages/python_dotenv-1.2.1.dist-info

Dependency Hierarchy:

  • python_dotenv-1.2.1-py3-none-any.whl (Vulnerable Library)

Found in base branch: main

Vulnerability Details

python-dotenv reads key-value pairs from a .env file and can set them as environment variables. Prior to version 1.2.2, "set_key()" and "unset_key()" in python-dotenv follow symbolic links when rewriting ".env" files, allowing a local attacker to overwrite arbitrary files via a crafted symlink when a cross-device rename fallback is triggered. Users should upgrade to v.1.2.2 or, as a workaround, apply the patch manually.

Publish Date: 2026-04-20

URL: CVE-2026-28684

Threat Assessment

Exploit Maturity: Not Defined

EPSS: 0.0%

CVSS 3 Score Details (6.6)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-mf9w-mj56-hr94

Release Date: 2026-04-20

Fix Resolution: 1.2.2

⛑️ Automatic Remediation will be attempted for this issue.


⛑️Automatic Remediation will be attempted for this issue.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions