Path Traversal Vulnerability in Werkzeug Web Application Library
CVE-2026-21860
6.3MEDIUM
What is CVE-2026-21860?
The Werkzeug library, a popular WSGI web application toolkit, has a vulnerability in its safe_join function that can be exploited to access restricted directories. Prior to version 3.1.5, this function incorrectly handled Windows device names, allowing them to be included in path segments even with file extensions or trailing spaces. Special device names like CON and AUX can be exploited, leading to potential unauthorized file access. Users are advised to upgrade to the patched version 3.1.5 to mitigate risks associated with this vulnerability.
Affected Version(s)
werkzeug < 3.1.5
References
CVSS V4
Score:
6.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
