CVE-2026-27641

CRITICAL
中文标题:
(暂无数据)
英文标题:
Flask-Reuploaded vulnerable to Remote Code Execution via Server-Side Template Injection
CVSS分数: 9.8
发布时间: 2026-02-25 03:54:54
漏洞类型: (暂无数据)
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v3
漏洞描述
中文描述:

(暂无数据)

英文描述:

Flask-Reuploaded provides file uploads for Flask. A critical path traversal and extension bypass vulnerability in versions prior to 1.5.0 allows remote attackers to achieve arbitrary file write and remote code execution through Server-Side Template Injection (SSTI). Flask-Reuploaded has been patched in version 1.5.0. Some workarounds are available. Do not pass user input to the `name` parameter, use auto-generated filenames only, and implement strict input validation if `name` must be used.

CWE类型:
CWE-1336 CWE-22
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
jugmac00 flask-reuploaded < 1.5.0 - - cpe:2.3:a:jugmac00:flask-reuploaded:<_1.5.0:*:*:*:*:*:*:*
jugmac00 flask-reuploaded * - - cpe:2.3:a:jugmac00:flask-reuploaded:*:*:*:*:*:python:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
https://github.com/jugmac00/flask-reuploaded/security/advisories/GHSA-65mp-fq8v-56jr x_refsource_CONFIRM
cve.org
访问
https://github.com/jugmac00/flask-reuploaded/pull/180 x_refsource_MISC
cve.org
访问
https://github.com/jugmac00/flask-reuploaded/commit/d64c6b2f71cb73734fc38baa0e3e156926361288 x_refsource_MISC
cve.org
访问
CVSS评分详情
3.1 (cna)
CRITICAL
9.8
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2026-02-25 03:54:54
修改时间:
2026-02-25 21:12:45
创建时间:
2026-02-26 06:00:01
更新时间:
2026-02-28 06:00:02
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2026-27641 2026-02-26 03:19:54 2026-02-25 22:00:01
NVD nvd_CVE-2026-27641 2026-02-26 02:00:04 2026-02-25 22:00:04
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN
安全公告
暂无安全公告信息
变更历史
v3 NVD
2026-02-28 06:00:02
affected_products_count: 1 → 2
查看详细变更
  • affected_products_count: 1 -> 2
v2 NVD
2026-02-26 06:00:04
data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • data_sources: ['cve'] -> ['cve', 'nvd']