Description
Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to 2.20.0, CORSConfig.allowed_origins_regex is constructed using a regex built from configured allowlist values and used with fullmatch() for validation. Because metacharacters are not escaped, a malicious origin can match unexpectedly. The check relies on allowed_origins_regex.fullmatch(origin). This vulnerability is fixed in 2.20.0.
INFO
Published Date :
2026-02-09T18:46:56.445Z
Last Modified :
2026-02-10T16:01:16.807Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-25478 vulnerability.
| Vendors | Products |
|---|---|
| Litestar |
|
| Litestar-org |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-25478.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact