Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to 2.20.0, CORSConfig.allowed_origins_regex is constructed using a regex built from configured allowlist values and used with fullmatch() for validation. Because metacharacters are not escaped, a malicious origin can match unexpectedly. The check relies on allowed_origins_regex.fullmatch(origin). This vulnerability is fixed in 2.20.0.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to 2.20.0, CORSConfig.allowed_origins_regex is constructed using a regex built from configured allowlist values and used with fullmatch() for validation. Because metacharacters are not escaped, a malicious origin can match unexpectedly. The check relies on allowed_origins_regex.fullmatch(origin). This vulnerability is fixed in 2.20.0. | |
| Title | Litestar has a CORS origin allowlist bypass due to unescaped regex metacharacters in allowed origins | |
| Weaknesses | CWE-942 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-09T18:46:56.445Z
Reserved: 2026-02-02T16:31:35.820Z
Link: CVE-2026-25478
No data.
Status : Received
Published: 2026-02-09T20:15:57.017
Modified: 2026-02-09T20:15:57.017
Link: CVE-2026-25478
No data.
OpenCVE Enrichment
No data.