CVE-2026-27641

Source
https://cve.org/CVERecord?id=CVE-2026-27641
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27641.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-27641
Aliases
Published
2026-02-25T03:54:54.391Z
Modified
2026-04-02T13:21:19.153954Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Flask-Reuploaded vulnerable to Remote Code Execution via Server-Side Template Injection
Details

Flask-Reuploaded provides file uploads for Flask. A critical path traversal and extension bypass vulnerability in versions prior to 1.5.0 allows remote attackers to achieve arbitrary file write and remote code execution through Server-Side Template Injection (SSTI). Flask-Reuploaded has been patched in version 1.5.0. Some workarounds are available. Do not pass user input to the name parameter, use auto-generated filenames only, and implement strict input validation if name must be used.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27641.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-1336"
    ]
}
References

Affected packages

Git / github.com/jugmac00/flask-reuploaded

Affected ranges

Type
GIT
Repo
https://github.com/jugmac00/flask-reuploaded
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*
0.2.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27641.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "1.5.0"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "Server-Side"
            }
        ]
    }
]