Generated remediation guidance and an executive summary. No account required.
`python-multipart` is a streaming multipart parser for Python. When using form data, `python-multipart` uses a Regular Expression to parse the HTTP `Content-Type` header, including options. An attacker could send a custom-made `Content-Type` option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests, leading to regular expression denial of service. This vulnerability has been patched in version 0.0.7.
Use CWE-400, Fastapiexpert vendor hub and Python-Multipart product page to widen CVE-2024-24762 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-24486 and CVE-2026-40347 for nearby disclosures in the same product family.