Changeflow GovPing Data Privacy & Cybersecurity Python Vulnerability Allows Code Execution
Priority review Notice Amended Final

Python Vulnerability Allows Code Execution

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 22nd, 2026
Detected March 23rd, 2026
Email

Summary

CERT-Bund has issued a security advisory regarding a vulnerability in Python versions prior to 3.15.0, which could allow attackers to execute arbitrary code. The advisory provides mitigation information and notes that the vulnerability affects Linux, UNIX, and Windows operating systems.

What changed

CERT-Bund has issued an advisory (WID-SEC-2026-0824) detailing a critical vulnerability in open-source Python versions prior to 3.15.0. This vulnerability, with a CVSS Base Score of 7.1, allows a remote attacker to execute arbitrary program code on affected systems. The advisory indicates that mitigation measures are available and that the vulnerability impacts Linux, UNIX, and Windows operating systems.

Organizations utilizing Python should immediately assess their software versions and apply available patches or mitigations to prevent potential code execution attacks. While no specific compliance deadline is mentioned, prompt action is recommended to secure systems and prevent exploitation. Failure to address this vulnerability could lead to system compromise and data breaches.

What to do next

  1. Assess Python versions for use of affected releases (<3.15.0)
  2. Apply available patches or mitigation strategies
  3. Review system logs for signs of exploitation

Source document (simplified)

[WID-SEC-2026-0824] Python: Schwachstelle ermöglicht Codeausführung CVSS Base Score 7.1 (hoch) CVSS Temporal Score 6.2 (mittel) Remoteangriff nein Datum 22.03.2026 Stand 23.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • Sonstiges
  • UNIX
  • Windows

Produktbeschreibung

Python ist eine universelle, üblicherweise interpretierte, höhere Programmiersprache.

Produkte

22.03.2026
- Open Source Python <3.15.0

Angriff

Angriff

Ein Angreifer kann eine Schwachstelle in Python ausnutzen, um beliebigen Programmcode auszuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 22nd, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-0824

Who this affects

Applies to
Employers Technology companies
Industry sector
5112 Software & Technology 5182 Data Processing & Hosting
Activity scope
Software Development System Administration
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Software Security Vulnerability Management

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.