CVE-2024-1968
- EPSS 0.19%
- Published 20.05.2024 08:15:08
- Last modified 15.07.2025 16:01:53
In scrapy/scrapy, an issue was identified where the Authorization header is not removed during redirects that only change the scheme (e.g., HTTPS to HTTP) but remain within the same domain. This behavior contravenes the Fetch standard, which mandates...
CVE-2024-3572
- EPSS 0.16%
- Published 16.04.2024 00:15:12
- Last modified 28.07.2025 14:49:45
The scrapy/scrapy project is vulnerable to XML External Entity (XXE) attacks due to the use of lxml.etree.fromstring for parsing untrusted XML data without proper validation. This vulnerability allows attackers to perform denial of service attacks, a...
CVE-2024-3574
- EPSS 0.12%
- Published 16.04.2024 00:15:12
- Last modified 28.07.2025 14:51:40
In scrapy version 2.10.1, an issue was identified where the Authorization header, containing credentials for server authentication, is leaked to a third-party site during a cross-domain redirect. This vulnerability arises from the failure to remove t...
CVE-2024-1892
- EPSS 0.06%
- Published 28.02.2024 00:15:53
- Last modified 10.01.2025 14:49:33
A Regular Expression Denial of Service (ReDoS) vulnerability exists in the XMLFeedSpider class of the scrapy/scrapy project, specifically in the parsing of XML content. By crafting malicious XML content that exploits inefficient regular expression co...
CVE-2022-0577
- EPSS 0.17%
- Published 02.03.2022 04:15:06
- Last modified 21.11.2024 06:38:57
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository scrapy/scrapy prior to 2.6.1.
CVE-2021-41125
- EPSS 0.21%
- Published 06.10.2021 18:15:10
- Last modified 21.11.2024 06:25:31
Scrapy is a high-level web crawling and scraping framework for Python. If you use `HttpAuthMiddleware` (i.e. the `http_user` and `http_pass` spider attributes) for HTTP authentication, all requests will expose your credentials to the request target. ...
CVE-2017-14158
- EPSS 0.44%
- Published 05.09.2017 17:29:00
- Last modified 20.04.2025 01:37:25
Scrapy 1.4 allows remote attackers to cause a denial of service (memory consumption) via large files because arbitrarily many files are read into memory, which is especially problematic if the files are then individually written in a separate thread ...