| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| spotipy | pip | < 2.22.1 | 2.22.1 |
The vulnerability stems from the URI/URL parsing logic in _get_id which accepted user input without strict validation. The original implementation used naive string splitting (split(':') and split('/')) to extract IDs, which could be manipulated with path traversal sequences. The security patch replaced this logic with strict regex pattern matching (via _regex_spotify_uri and _regex_spotify_url) to prevent injection of malicious paths. The function's role in processing user-supplied URIs/URLs for API requests makes it the clear vulnerable point for this path traversal issue.
KEV Misses 88% of Exploited CVEs- Get the report