CVE-2026-21860

EUVD-2026-1425
Werkzeug is a comprehensive WSGI web application library. Prior to version 3.1.5, Werkzeug's safe_join function allows path segments with Windows device names that have file extensions or trailing spaces. On Windows, there are special device names such as CON, AUX, etc that are implicitly present and readable in every directory. Windows still accepts them with any file extension, such as CON.txt, or trailing spaces such as CON. This issue has been patched in version 3.1.5.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 5%
Affected Products (NVD)
VendorProductVersion
palletsprojectswerkzeug
𝑥
< 3.1.5
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
python-werkzeug
bookworm
2.2.2-3+deb12u1
fixed
bullseye
1.0.1+dfsg1-2+deb11u1
fixed
bullseye (security)
1.0.1+dfsg1-2+deb11u2
fixed
forky
3.1.5-1
fixed
sid
3.1.5-1
fixed
trixie
3.1.3-2
fixed