{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-6069","assignerOrgId":"28c92f92-d60d-412d-b760-e73465c3df22","state":"PUBLISHED","assignerShortName":"PSF","dateReserved":"2025-06-13T14:05:15.473Z","datePublished":"2025-06-17T13:39:46.058Z","dateUpdated":"2026-04-21T20:17:13.876Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["html.parser"],"product":"CPython","repo":"https://github.com/python/cpython","vendor":"Python Software Foundation","versions":[{"version":"0","lessThan":"3.10.19","status":"affected","versionType":"python"},{"version":"3.11.0","lessThan":"3.11.14","status":"affected","versionType":"python"},{"version":"3.12.0","lessThan":"3.12.12","status":"affected","versionType":"python"},{"version":"3.13.0","lessThan":"3.13.6","status":"affected","versionType":"python"},{"version":"3.14.0a1","lessThan":"3.14.0b3","status":"affected","versionType":"python"}]}],"credits":[{"lang":"en","type":"remediation developer","value":"Serhiy Storchaka"},{"lang":"en","type":"reporter","value":"Jake Howard"},{"lang":"en","type":"finder","value":"sw0rd1ight"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service."}],"value":"The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-1333","description":"CWE-1333 Inefficient Regular Expression Complexity","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"28c92f92-d60d-412d-b760-e73465c3df22","shortName":"PSF","dateUpdated":"2026-04-21T20:17:13.876Z"},"references":[{"tags":["issue-tracking"],"url":"https://github.com/python/cpython/issues/135462"},{"tags":["patch"],"url":"https://github.com/python/cpython/pull/135464"},{"tags":["patch"],"url":"https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949"},{"tags":["patch"],"url":"https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41"},{"tags":["patch"],"url":"https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b"},{"tags":["vendor-advisory"],"url":"https://mail.python.org/archives/list/security-announce@python.org/thread/K5PIYLR6EP3WR7ZOKKYQUWEDNQVUXOYM/"},{"tags":["patch"],"url":"https://github.com/python/cpython/commit/8d1b3dfa09135affbbf27fb8babcf3c11415df49"},{"tags":["patch"],"url":"https://github.com/python/cpython/commit/ab0893fd5c579d9cea30841680e6d35fc478afb5"},{"tags":["patch"],"url":"https://github.com/python/cpython/commit/f3c6f882cddc8dc30320d2e73edf019e201394fc"},{"tags":["patch"],"url":"https://github.com/python/cpython/commit/fdc9d214c01cb4588f540cfa03726bbf2a33fc15"}],"source":{"discovery":"UNKNOWN"},"title":"HTMLParser quadratic complexity when processing malformed inputs","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-17T13:58:28.646020Z","id":"CVE-2025-6069","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-17T13:58:41.637Z"}}]}}