{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-3446","assignerOrgId":"28c92f92-d60d-412d-b760-e73465c3df22","state":"PUBLISHED","assignerShortName":"PSF","dateReserved":"2026-03-02T16:15:14.567Z","datePublished":"2026-04-10T18:17:35.045Z","dateUpdated":"2026-04-13T16:07:24.229Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["base64"],"product":"CPython","repo":"https://github.com/python/cpython","vendor":"Python Software Foundation","versions":[{"lessThan":"3.13.13","status":"affected","version":"0","versionType":"python"},{"lessThan":"3.14.4","status":"affected","version":"3.14.0","versionType":"python"},{"lessThan":"3.15.0a8","status":"affected","version":"3.15.0a1","versionType":"python"}]}],"credits":[{"lang":"en","type":"reporter","value":"Serhiy Storchaka"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"When calling base64.b64decode() or related functions the decoding process would stop after encountering the first padded quad regardless of whether there was more information to be processed. This can lead to data being accepted which may be processed differently by other implementations. Use \"validate=True\" to enable stricter processing of base64 data."}],"value":"When calling base64.b64decode() or related functions the decoding process would stop after encountering the first padded quad regardless of whether there was more information to be processed. This can lead to data being accepted which may be processed differently by other implementations. Use \"validate=True\" to enable stricter processing of base64 data."}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"HIGH","attackRequirements":"PRESENT","attackVector":"NETWORK","baseScore":6,"baseSeverity":"MEDIUM","exploitMaturity":"NOT_DEFINED","privilegesRequired":"LOW","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"28c92f92-d60d-412d-b760-e73465c3df22","shortName":"PSF","dateUpdated":"2026-04-10T18:26:41.904Z"},"references":[{"tags":["patch"],"url":"https://github.com/python/cpython/pull/145267"},{"tags":["issue-tracking"],"url":"https://github.com/python/cpython/issues/145264"},{"tags":["vendor-advisory"],"url":"https://mail.python.org/archives/list/security-announce@python.org/thread/F5ZT5ICGJ6CKXVUJ34YBVY7WOZ5SHG53/"},{"tags":["patch"],"url":"https://github.com/python/cpython/commit/1f9958f909c1b41a4ffc0b613ef8ec8fa5e7c474"},{"tags":["patch"],"url":"https://github.com/python/cpython/commit/4561f6418a691b3e89aef0901f53fe0dfb7f7c0e"},{"tags":["patch"],"url":"https://github.com/python/cpython/commit/e31c55121620189a0d1a07b689762d8ca9c1b7fa"}],"source":{"discovery":"UNKNOWN"},"title":"Base64 decoding stops at first padded quad by default","x_generator":{"engine":"cvelib 1.8.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-345","lang":"en","description":"CWE-345 Insufficient Verification of Data Authenticity"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-13T16:06:04.489473Z","id":"CVE-2026-3446","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-13T16:07:24.229Z"}}]}}