Exploit for CVE-2025-50182

urllib3 is a user-friendly HTTP client library for Python. Starting in version 2.2.0 and prior to 2.5.0, urllib3 does not control redirects in browsers and Node.js. urllib3 supports being used in a Pyodide runtime utilizing the JavaScript Fetch API or falling back on XMLHttpRequest. This means Python libraries can be used to make HTTP requests from a browser or Node.js. Additionally, urllib3 provides a mechanism to control redirects, but the retries and redirect parameters are ignored with Pyodide, the runtime itself determines redirect behavior. This issue has been patched in version 2.5.0.

Published: 2025-06-19

CVSS: 6.1

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Download Exploit for CVE-2025-50182 here:

Tip: Download official Tor Browser at https://www.torproject.org/download/ to access .onion links.

https://augustaverburg.nl/exploit-449-cve-2023-2976/

https://augustaverburg.nl/exploit-798-cve-2025-30712/

https://augustaverburg.nl/exploit-760-cve-2017-0263/

https://augustaverburg.nl/exploit-485-cve-2010-2883/

https://augustaverburg.nl/exploit-248-cve-2025-57772/