GHSA-vp96-hxj8-p424

Suggest an improvement
Source
https://github.com/advisories/GHSA-vp96-hxj8-p424
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-vp96-hxj8-p424/GHSA-vp96-hxj8-p424.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-vp96-hxj8-p424
Aliases
  • CVE-2026-27448
Downstream
Related
Published
2026-03-16T15:15:43Z
Modified
2026-03-19T18:31:37.731295Z
Severity
  • 1.7 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U CVSS Calculator
Summary
pyOpenSSL allows TLS connection bypass via unhandled callback exception in set_tlsext_servername_callback
Details

If a user provided callback to set_tlsext_servername_callback raised an unhandled exception, this would result in a connection being accepted. If a user was relying on this callback for any security-sensitive behavior, this could allow bypassing it.

Unhandled exceptions now result in rejecting the connection.

Credit to Leury Castillo for reporting this issue.

Database specific
{
    "github_reviewed": true,
    "github_reviewed_at": "2026-03-16T15:15:43Z",
    "cwe_ids": [
        "CWE-636"
    ],
    "nvd_published_at": "2026-03-18T00:16:19Z",
    "severity": "LOW"
}
References

Affected packages

PyPI / pyopenssl

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0.14.0
Fixed
26.0.0

Affected versions

0.*
0.14
0.15
0.15.1
16.*
16.0.0
16.1.0
16.2.0
17.*
17.0.0
17.1.0
17.2.0
17.3.0
17.4.0
17.5.0
18.*
18.0.0
19.*
19.0.0
19.1.0
20.*
20.0.0
20.0.1
21.*
21.0.0
22.*
22.0.0
22.1.0
23.*
23.0.0
23.1.0
23.1.1
23.2.0
23.3.0
24.*
24.0.0
24.1.0
24.2.1
24.3.0
25.*
25.0.0
25.1.0
25.2.0
25.3.0

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-vp96-hxj8-p424/GHSA-vp96-hxj8-p424.json"