A Path Traversal vulnerability exists when using non-default configuration options UPLOAD_DIR and UPLOAD_KEEP_FILENAME=True. An attacker can write uploaded files to arbitrary locations on the filesystem by crafting a malicious filename.
When UPLOAD_DIR is set and UPLOAD_KEEP_FILENAME is True, the library constructs the file path using os.path.join(file_dir, fname). Due to the behavior of os.path.join(), if the filename begins with a /, all preceding path components are discarded:
os.path.join("/upload/dir", "/etc/malicious") == "/etc/malicious"
This allows an attacker to bypass the intended upload directory and write files to arbitrary paths.
Projects are only affected if all of the following are true:
- UPLOAD_DIR is set
- UPLOAD_KEEP_FILENAME is set to True
- The uploaded file exceeds MAX_MEMORY_FILE_SIZE (triggering a flush to disk)
The default configuration is not vulnerable.
Arbitrary file write to attacker-controlled paths on the filesystem.
Upgrade to version 0.0.22, or avoid using UPLOAD_KEEP_FILENAME=True in project configurations.
{
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"nvd_published_at": "2026-01-27T01:16:02Z",
"github_reviewed": true,
"github_reviewed_at": "2026-01-26T23:28:05Z"
}