corydolphin/flask-cors version 4.0.1 contains an improper regex path matching vulnerability. The plugin prioritizes longer regex patterns over more specific ones when matching paths, which can lead to less restrictive CORS policies being applied to sensitive endpoints. This mismatch in regex pattern priority allows unauthorized cross-origin access to sensitive data or functionality, potentially exposing confidential information and increasing the risk of unauthorized actions by malicious actors.
References
Link | Resource |
---|---|
https://huntr.com/bounties/403eb1fc-86f4-4820-8eba-0f3dfae9f2b4 | Exploit Third Party Advisory |
Configurations
History
01 Aug 2025, 12:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://huntr.com/bounties/403eb1fc-86f4-4820-8eba-0f3dfae9f2b4 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:flask-cors_project:flask-cors:4.0.1:*:*:*:*:*:*:* | |
First Time |
Flask-cors Project flask-cors
Flask-cors Project |
|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-08-01 12:26
NVD link : CVE-2024-6839
Mitre link : CVE-2024-6839
CVE.ORG link : CVE-2024-6839
JSON object : View
Products Affected
flask-cors_project
- flask-cors
CWE
CWE-41
Improper Resolution of Path Equivalence