Encode Encode

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Encode product.

RSS Feeds for Encode security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Encode products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Encode Sorted by Most Security Vulnerabilities since 2018

Encode Starlette4 vulnerabilities

Encode Httpx1 vulnerability

Encode Uvicorn1 vulnerability

By the Year

In 2026 there have been 0 vulnerabilities in Encode. Last year, in 2025 Encode had 1 security vulnerability published. Right now, Encode is on track to have less security vulnerabilities in 2026 than it did last year.




Year Vulnerabilities Average Score
2026 0 0.00
2025 1 7.50
2024 1 7.50
2023 2 7.50
2022 1 9.10
2021 0 0.00
2020 2 5.70

It may take a day or so for new Encode vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Encode Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2025-62727 Oct 28, 2025
Starlette FileResponse CPU Exhaustion via Range Header (0.49.0) Starlette is a lightweight ASGI framework/toolkit. Starting in version 0.39.0 and prior to version 0.49.1 , an unauthenticated attacker can send a crafted HTTP Range header that triggers quadratic-time processing in Starlette's FileResponse Range parsing/merging logic. This enables CPU exhaustion per request, causing denialofservice for endpoints serving files (e.g., StaticFiles or any use of FileResponse). This vulnerability is fixed in 0.49.1.
Starlette
CVE-2024-24762 Feb 05, 2024
ReDoS: Content-Type parsing in python-multipart v0.0.6 or below `python-multipart` is a streaming multipart parser for Python. When using form data, `python-multipart` uses a Regular Expression to parse the HTTP `Content-Type` header, including options. An attacker could send a custom-made `Content-Type` option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests, leading to regular expression denial of service. This vulnerability has been patched in version 0.0.7.
Starlette
CVE-2023-29159 Jun 01, 2023
Directory Traversal in Starlette 0.13.5<0.27.0 (remote, unauthenticated) Directory traversal vulnerability in Starlette versions 0.13.5 and later and prior to 0.27.0 allows a remote unauthenticated attacker to view files in a web service which was built using Starlette.
Starlette
CVE-2023-30798 Apr 21, 2023
Excessive Memory DoS via MultipartParser in Starlette <0.25.0 There MultipartParser usage in Encode's Starlette python framework before versions 0.25.0 allows an unauthenticated and remote attacker to specify any number of form fields or files which can cause excessive memory usage resulting in denial of service of the HTTP service.
Starlette
CVE-2021-41945 Apr 28, 2022
Encode OSS httpx < 0.23.0 is affected by improper input validation in `httpx.URL` Encode OSS httpx < 0.23.0 is affected by improper input validation in `httpx.URL`, `httpx.Client` and some functions using `httpx.URL.copy_with`.
Httpx
CVE-2020-25626 Sep 30, 2020
A flaw was found in Django REST Framework versions before 3.12.0 and before 3.11.2 A flaw was found in Django REST Framework versions before 3.12.0 and before 3.11.2. When using the browseable API viewer, Django REST Framework fails to properly escape certain strings that can come from user input. This allows a user who can control those strings to inject malicious <script> tags, leading to a cross-site-scripting (XSS) vulnerability.
Django Rest Framework
CVE-2020-7695 Jul 27, 2020
Uvicorn before 0.11.7 is vulnerable to HTTP response splitting Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers.
Uvicorn
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.