VYPR

PyPI package

werkzeug

pkg:pypi/werkzeug

Vulnerabilities (11)

  • CVE-2026-27199Feb 21, 2026
    affected < 3.1.6fixed 3.1.6

    Werkzeug is a comprehensive WSGI web application library. Versions 3.1.5 and below, the safe_join function allows Windows device names as filenames if preceded by other path segments. This was previously reported as GHSA-hgf8-39gv-g3f2, but the added filtering failed to account f

  • CVE-2026-21860Jan 8, 2026
    affected < 3.1.5fixed 3.1.5

    Werkzeug is a comprehensive WSGI web application library. Prior to version 3.1.5, Werkzeug's safe_join function allows path segments with Windows device names that have file extensions or trailing spaces. On Windows, there are special device names such as CON, AUX, etc that are i

  • CVE-2025-66221Nov 29, 2025
    affected < 3.1.4fixed 3.1.4

    Werkzeug is a comprehensive WSGI web application library. Prior to version 3.1.4, Werkzeug's safe_join function allows path segments with Windows device names. On Windows, there are special device names such as CON, AUX, etc that are implicitly present and readable in every direc

  • CVE-2024-49766Oct 25, 2024
    affected < 3.0.6fixed 3.0.6

    Werkzeug is a Web Server Gateway Interface web application library. On Python < 3.11 on Windows, os.path.isabs() does not catch UNC paths like //server/share. Werkzeug's safe_join() relies on this check, and so can produce a path that is not safe, potentially allowing unintended

  • CVE-2024-34069May 6, 2024
    affected < 3.0.3fixed 3.0.3

    Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain

  • CVE-2023-25577Feb 14, 2023
    affected < 2.2.3fixed 2.2.3

    Werkzeug is a comprehensive WSGI web application library. Prior to version 2.2.3, Werkzeug's multipart form data parser will parse an unlimited number of parts, including file parts. Parts can be a small amount of bytes, but each requires CPU time to parse and may use more memory

  • CVE-2023-23934Feb 14, 2023
    affected < 2.2.3fixed 2.2.3

    Werkzeug is a comprehensive WSGI web application library. Browsers may allow "nameless" cookies that look like `=value` instead of `key=value`. A vulnerable browser may allow a compromised application on an adjacent subdomain to exploit this to set a cookie like `=__Host-test=bad

  • CVE-2020-28724Nov 18, 2020
    affected < 0.11.6fixed 0.11.6

    Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL.

  • CVE-2019-14806Aug 9, 2019
    affected < 0.15.3fixed 0.15.3

    Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because Docker containers share the same machine id.

  • CVE-2019-14322Jul 28, 2019
    affected < 0.15.5fixed 0.15.5

    In Pallets Werkzeug before 0.15.5, SharedDataMiddleware mishandles drive names (such as C:) in Windows pathnames.

  • CVE-2016-10516MedOct 23, 2017
    affected < 0.11.11fixed 0.11.11

    Cross-site scripting (XSS) vulnerability in the render_full function in debug/tbtools.py in the debugger in Pallets Werkzeug before 0.11.11 (as used in Pallets Flask and other products) allows remote attackers to inject arbitrary web script or HTML via a field that contains an ex