CVE-2026-27641

Source
https://cve.org/CVERecord?id=CVE-2026-27641
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27641.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-27641
Aliases
Published
2026-02-25T03:54:54.391Z
Modified
2026-03-01T07:33:30.658968Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Flask-Reuploaded vulnerable to Remote Code Execution via Server-Side Template Injection
Details

Flask-Reuploaded provides file uploads for Flask. A critical path traversal and extension bypass vulnerability in versions prior to 1.5.0 allows remote attackers to achieve arbitrary file write and remote code execution through Server-Side Template Injection (SSTI). Flask-Reuploaded has been patched in version 1.5.0. Some workarounds are available. Do not pass user input to the name parameter, use auto-generated filenames only, and implement strict input validation if name must be used.

Database specific
{
    "cwe_ids": [
        "CWE-1336"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27641.json"
}
References

Affected packages

Git / github.com/jugmac00/flask-reuploaded

Affected ranges

Type
GIT
Repo
https://github.com/jugmac00/flask-reuploaded
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*
0.2.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27641.json"