The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-41945

CVE-2021-41945: Encode Httpx Input Validation Vulnerability

CVE-2021-41945 is an input validation vulnerability in Encode Httpx versions prior to 0.23.0, affecting httpx.URL, httpx.Client, and related functions. This article covers technical details, affected versions, and steps to secure your implementation.

Published: February 25, 2026

CVE-2021-41945 Overview

CVE-2021-41945 is an improper input validation vulnerability affecting Encode OSS httpx, a popular Python HTTP client library. Versions prior to 0.23.0 are affected by improper input validation in httpx.URL, httpx.Client, and several functions utilizing httpx.URL.copy_with. This vulnerability allows attackers to manipulate URL handling, potentially leading to unauthorized access to sensitive information or the ability to modify data in transit.

Critical Impact

This improper input validation vulnerability in httpx allows attackers to exploit URL parsing weaknesses, potentially enabling Server-Side Request Forgery (SSRF) attacks or bypassing security controls in applications that rely on httpx for HTTP communications.

Affected Products

  • Encode httpx versions prior to 0.23.0
  • Python applications using vulnerable httpx versions
  • Any system or service relying on affected httpx library for HTTP requests

Discovery Timeline

  • 2022-04-28 - CVE CVE-2021-41945 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2021-41945

Vulnerability Analysis

The vulnerability stems from insufficient input validation within the httpx URL parsing and handling components. The affected functions (httpx.URL, httpx.Client, and httpx.URL.copy_with) fail to properly validate and sanitize URL inputs, creating potential security weaknesses.

When httpx processes URLs, the improper validation allows specially crafted URL strings to bypass expected security checks. This can lead to unexpected behavior in how the library resolves and connects to target hosts, potentially allowing attackers to redirect requests to unintended destinations or access internal resources.

The network-accessible nature of this vulnerability means that applications exposing httpx-based functionality to untrusted input are at significant risk. Exploitation requires no authentication or user interaction, making it particularly dangerous in web applications and APIs.

Root Cause

The root cause of CVE-2021-41945 is classified as CWE-20 (Improper Input Validation). The httpx library prior to version 0.23.0 did not adequately validate URL components when parsing user-supplied input or when using the copy_with method to modify URL objects. This allows attackers to inject malicious values that bypass expected URL structure validation.

Attack Vector

The attack vector for this vulnerability is network-based. An attacker can exploit this vulnerability by providing maliciously crafted URLs to applications using vulnerable versions of httpx. The attack does not require any privileges or user interaction.

Exploitation typically involves:

  1. Identifying an application using httpx for HTTP requests
  2. Crafting a malicious URL that exploits the improper validation
  3. Supplying this URL to the application through any input vector that gets processed by httpx
  4. The malformed URL bypasses validation checks, potentially redirecting requests or accessing unintended resources

For detailed technical analysis and proof-of-concept information, refer to the GitHub Gist Code Snippet and the GitHub HTTPX Issue.

Detection Methods for CVE-2021-41945

Indicators of Compromise

  • Unexpected outbound HTTP connections to internal IP addresses or localhost from applications using httpx
  • Anomalous URL patterns in application logs showing malformed or suspicious URL structures
  • Evidence of SSRF-like behavior where internal resources are accessed through external-facing applications
  • Unusual error messages related to URL parsing or connection failures in httpx

Detection Strategies

  • Implement dependency scanning to identify httpx versions prior to 0.23.0 in your Python environments
  • Monitor application logs for suspicious URL patterns that may indicate exploitation attempts
  • Deploy web application firewalls (WAF) with rules to detect malformed URL injection attempts
  • Use runtime application self-protection (RASP) to detect and block URL manipulation attacks

Monitoring Recommendations

  • Enable verbose logging for httpx operations in production environments to capture URL handling behavior
  • Set up alerts for any httpx-related errors or exceptions that may indicate exploitation attempts
  • Monitor network traffic for unexpected connections originating from applications using httpx
  • Regularly audit Python dependencies using tools like pip-audit or Snyk to detect vulnerable packages

How to Mitigate CVE-2021-41945

Immediate Actions Required

  • Upgrade httpx to version 0.23.0 or later immediately to address this vulnerability
  • Audit all Python applications and services using httpx to identify vulnerable installations
  • Review application code for any custom URL handling that may be affected by this vulnerability
  • Implement input validation at the application level as a defense-in-depth measure

Patch Information

Encode has released version 0.23.0 of httpx that addresses this improper input validation vulnerability. Organizations should upgrade to this version or later as soon as possible.

The fix can be applied by updating the httpx package using pip:

bash
pip install --upgrade httpx>=0.23.0

For additional information about the release, see the GitHub HTTPX Release 0.23.0. Community discussion regarding this issue is available at the GitHub HTTPX Discussion.

Workarounds

  • Implement strict input validation for all URLs before passing them to httpx functions
  • Use allowlists for permitted hosts and URL schemes to restrict where httpx can make requests
  • Deploy network-level controls to prevent SSRF attacks by blocking internal network access from vulnerable applications
  • Consider using a web application firewall to filter malicious URL patterns at the perimeter
bash
# Configuration example - Upgrade httpx using pip
pip install httpx==0.23.0

# Verify installed version
pip show httpx | grep Version

# For requirements.txt, ensure minimum version
# httpx>=0.23.0

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeOther

  • Vendor/TechEncode Httpx

  • SeverityCRITICAL

  • CVSS Score9.1

  • EPSS Probability0.69%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-20
  • Technical References
  • GitHub Gist Code Snippet

  • GitHub HTTPX Repository

  • GitHub HTTPX Discussion

  • GitHub HTTPX Issue

  • GitHub HTTPX Release 0.23.0
  • Vendor Resources
  • Encode Website
  • Latest CVEs
  • CVE-2025-9185: Mozilla Firefox RCE Vulnerability

  • CVE-2025-9184: Mozilla Firefox RCE Vulnerability

  • CVE-2025-9180: Mozilla Firefox Auth Bypass Vulnerability

  • CVE-2025-8030: Mozilla Firefox RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English