{"uuid": "958c72e3-e40a-4113-8540-29cf2db96fdb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4516", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16518", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4516\n\ud83d\udd25 CVSS Score: 5.9 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: There is an issue in CPython when using `bytes.decode(\"unicode_escape\", error=\"ignore|replace\")`. If you are not using the \"unicode_escape\" encoding or an error handler your usage is not affected. To work-around this issue you may stop using the error= handler and instead wrap the bytes.decode() call in a try-except catching the DecodeError.\n\ud83d\udccf Published: 2025-05-15T13:29:20.126Z\n\ud83d\udccf Modified: 2025-05-15T14:18:50.599Z\n\ud83d\udd17 References:\n1. https://github.com/python/cpython/issues/133767\n2. https://github.com/python/cpython/pull/129648\n3. https://mail.python.org/archives/list/security-announce@python.org/thread/L75IPBBTSCYEF56I2M4KIW353BB3AY74/\n4. https://github.com/python/cpython/commit/69b4387f78f413e8c47572a85b3478c47eba8142\n5. https://github.com/python/cpython/commit/9f69a58623bd01349a18ba0c7a9cb1dad6a51e8e", "creation_timestamp": "2025-05-15T14:35:22.000000Z"}