Vulnerability Database
Blog
FAQ
Docs
arrow_forward
search
CVE-2020-28724
See a problem?
Please try reporting it
to the source
first.
Source
https://nvd.nist.gov/vuln/detail/CVE-2020-28724
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-28724.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-28724
Aliases
GHSA-3p3h-qghp-hvh2
PYSEC-2020-157
Downstream
DEBIAN-CVE-2020-28724
UBUNTU-CVE-2020-28724
USN-4655-1
Published
2020-11-18T15:15:12Z
Modified
2025-10-14T17:53:13.546027Z
Severity
6.1 (Medium)
CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS Calculator
Summary
[none]
Details
Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL.
References
https://github.com/pallets/flask/issues/1639
https://github.com/pallets/werkzeug/issues/822
https://github.com/pallets/werkzeug/pull/890/files
Affected packages
Git
/
github.com/pallets/werkzeug
Affected ranges
Type
GIT
Repo
https://github.com/pallets/werkzeug
Events
Introduced
0
Unknown introduced commit / All previous commits are affected
Fixed
e6d0e510738952788fdd01bbfe5dfb2d8cff0ba4
Affected versions
0.*
0.1
0.10
0.10.1
0.10.2
0.10.3
0.10.4
0.11
0.11.1
0.11.2
0.11.3
0.11.4
0.11.5
0.2
0.3
0.3.1
0.4
0.4.1
0.5
0.5.1
0.6
0.6.1
0.6.2
0.7
0.8
0.8.1
0.8.2
0.8.3
0.9
0.9.1
0.9.2
0.9.3
0.9.4
0.9.5
0.9.6
CVE-2020-28724 - OSV