Flask-Reuploaded provides file uploads for Flask. A critical path traversal and extension bypass vulnerability in versions prior to 1.5.0 allows remote attackers to achieve arbitrary file write and remote code execution through Server-Side Template Injection (SSTI). Flask-Reuploaded has been patched in version 1.5.0. Some workarounds are available. Do not pass user input to the `name` parameter, use auto-generated filenames only, and implement strict input validation if `name` must be used.
References
| Link | Resource |
|---|---|
| https://github.com/jugmac00/flask-reuploaded/commit/d64c6b2f71cb73734fc38baa0e3e156926361288 | Patch |
| https://github.com/jugmac00/flask-reuploaded/pull/180 | Issue Tracking Patch |
| https://github.com/jugmac00/flask-reuploaded/security/advisories/GHSA-65mp-fq8v-56jr | Exploit Vendor Advisory |
Configurations
History
27 Feb 2026, 18:40
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:jugmac00:flask-reuploaded:*:*:*:*:*:python:*:* | |
| References | () https://github.com/jugmac00/flask-reuploaded/commit/d64c6b2f71cb73734fc38baa0e3e156926361288 - Patch | |
| References | () https://github.com/jugmac00/flask-reuploaded/pull/180 - Issue Tracking, Patch | |
| References | () https://github.com/jugmac00/flask-reuploaded/security/advisories/GHSA-65mp-fq8v-56jr - Exploit, Vendor Advisory | |
| CWE | CWE-22 | |
| First Time |
Jugmac00
Jugmac00 flask-reuploaded |
25 Feb 2026, 04:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-25 04:16
Updated : 2026-02-27 18:40
NVD link : CVE-2026-27641
Mitre link : CVE-2026-27641
CVE.ORG link : CVE-2026-27641
JSON object : View
Products Affected
jugmac00
- flask-reuploaded
