CVE-2026-27199

Source
https://cve.org/CVERecord?id=CVE-2026-27199
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27199.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-27199
Aliases
Downstream
Related
Published
2026-02-21T05:15:53.335Z
Modified
2026-04-10T05:37:06.369932Z
Severity
  • 6.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N CVSS Calculator
Summary
Werkzeug safe_join() allows Windows special device names
Details

Werkzeug is a comprehensive WSGI web application library. Versions 3.1.5 and below, the safejoin function allows Windows device names as filenames if preceded by other path segments. This was previously reported as GHSA-hgf8-39gv-g3f2, but the added filtering failed to account for the fact that safejoin accepts paths with multiple segments, such as example/NUL. The function sendfromdirectory uses safe_join to safely serve files at user-specified paths under a directory. If the application is running on Windows, and the requested path ends with a special device name, the file will be opened successfully, but reading will hang indefinitely. This issue has been fixed in version 3.1.6.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27199.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-67"
    ]
}
References

Affected packages

Git / github.com/pallets/werkzeug

Affected ranges

Type
GIT
Repo
https://github.com/pallets/werkzeug
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*
0.1
0.10
0.11
0.12
0.13
0.14
0.15.0
0.2
0.3
0.4
0.4.1
0.6
0.6.1
0.6.2
0.7
0.8
0.9
1.*
1.0.0
1.0.0rc1
2.*
2.0.0
2.0.0rc1
2.0.0rc2
2.0.0rc3
2.0.0rc4
2.0.0rc5
2.1.0
2.2.0
2.2.0a1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27199.json"