When calling base64.b64decode() or related functions the decoding process would stop after encountering the first padded quad regardless of whether there was more information to be processed. This can lead to data being accepted which may be processed differently by other implementations. Use "validate=True" to enable stricter processing of base64 data.
History

Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Tue, 14 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1286
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N'}

threat_severity

Moderate


Mon, 13 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-345
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Python
Python cpython
Vendors & Products Python
Python cpython

Fri, 10 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
Description When calling base64.b64decode() or related functions the decoding process would stop after encountering the first padded quad regardless of whether there was more information to be processed. This can lead to data being accepted which may be processed differently by other implementations. Use "validate=True" to enable stricter processing of base64 data.
Title Base64 decoding stops at first padded quad by default
References
Metrics cvssV4_0

{'score': 6, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: PSF

Published: 2026-04-10T18:17:35.045Z

Updated: 2026-04-13T16:07:24.229Z

Reserved: 2026-03-02T16:15:14.567Z

Link: CVE-2026-3446

cve-icon Vulnrichment

Updated: 2026-04-13T16:07:10.721Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-10T19:16:26.220

Modified: 2026-04-13T17:16:30.610

Link: CVE-2026-3446

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-10T18:17:35Z

Links: CVE-2026-3446 - Bugzilla