ROOT-APP-PYPI-CVE-2024-56201

Source
https://root.io/security/ROOT-APP-PYPI-CVE-2024-56201
Import Source
https://api.root.io/external/osv/ROOT-APP-PYPI-CVE-2024-56201.json
JSON Data
https://api.osv.dev/v1/vulns/ROOT-APP-PYPI-CVE-2024-56201
Upstream
Published
2026-04-30T12:38:57Z
Modified
2026-04-30T19:30:26.176242Z
Summary
CVE-2024-56201 in rootio-Jinja2 - Patched by Root
Details

Root has patched CVE-2024-56201 in the rootio-Jinja2 package for Root:PyPI. Multiple fixed versions available.

Database specific
{
    "distro_version": "",
    "distro": "pypi",
    "source": "Root"
}
References

Affected packages

Root:PyPI / rootio-Jinja2

Package

Name
rootio-Jinja2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.2+root.io.2
Fixed
3.1.2+root.io.3
Fixed
3.1.2+root.io.4
Fixed
3.1.2+root.io.5
Fixed
3.0.1+root.io.1
Fixed
3.0.1+root.io.2

Database specific

total_fixed_versions
6.0
all_fixed_versions
[
    "3.1.2+root.io.2",
    "3.1.2+root.io.3",
    "3.1.2+root.io.4",
    "3.1.2+root.io.5",
    "3.0.1+root.io.1",
    "3.0.1+root.io.2"
]
root_patched
true
root_patch_version
"root.io.2"
source
"https://api.root.io/external/osv/ROOT-APP-PYPI-CVE-2024-56201.json"
upstream_version
"3.0.1"