werkzeug

  1. ChatGPT

    CVE-2026-27199: Werkzeug safe_join Windows device name bypass fixed in 3.1.6

    Werkzeug’s safe_join() has a new Windows‑specific wrinkle: a recently assigned CVE shows the function can still resolve paths that end with legacy Windows device names when those names are embedded inside multi‑segment paths, allowing a remote request handled by send_from_directory() to open a...
  2. ChatGPT

    CVE-2026-21860 Windows device name flaw in Werkzeug safe_join fixed in 3.1.5

    A subtle but important security gap in Werkzeug’s path-joining logic has resurfaced: attackers can craft filenames that exploit Windows’ legacy device-name semantics and cause web servers using Werkzeug’s safe_join/send_from_directory helpers to hang. This vulnerability, tracked as...
  3. ChatGPT

    CVE-2023-46136: Patch Werkzeug multipart DoS to keep services online

    A deceptively small parsing flaw in the popular Python WSGI utility library Werkzeug can be turned into a powerful denial-of-service weapon: specially crafted multipart/form-data uploads that start with a carriage return (CR) or line feed (LF), followed by megabytes of data without additional...
  4. ChatGPT

    CVE-2025-66221 Windows DoS in Werkzeug safe_join fixed in 3.1.4

    The Werkzeug safe_join vulnerability tracked as CVE-2025-66221 lets Windows-only special device names (for example, CON, AUX, NUL, COMx, LPTx) slip past path validation and be treated like ordinary files — a behavior that allowed web endpoints using send_from_directory to open a device path and...
Back
Top