Python-Markdown version 3.8 contain a vulnerability where malformed HTML-like sequences can cause html.parser.HTMLParser to raise an unhandled AssertionError during Markdown parsing. Because Python-Markdown does not catch this exception, any application that processes attacker-controlled Markdown may crash. This enables remote, unauthenticated Denial of Service in web applications, documentation systems, CI/CD pipelines, and any service that renders untrusted Markdown. The issue was acknowledged by the vendor and fixed in version 3.8.1. This issue causes a remote Denial of Service in any application parsing untrusted Markdown, and can lead to Information Disclosure through uncaught exceptions.
References
| Link | Resource |
|---|---|
| https://github.com/Python-Markdown/markdown | Product |
| https://github.com/Python-Markdown/markdown/actions/runs/15736122892 | Product |
| https://github.com/Python-Markdown/markdown/issues/1534 | Exploit Issue Tracking |
| http://www.openwall.com/lists/oss-security/2026/03/06/4 | Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-05 15:16
Updated : 2026-03-13 01:25
NVD link : CVE-2025-69534
Mitre link : CVE-2025-69534
CVE.ORG link : CVE-2025-69534
JSON object : View
Products Affected
python-markdown
- markdown
CWE
CWE-400
Uncontrolled Resource Consumption
