CVE-2026-27199

EUVD-2026-7732
Werkzeug is a comprehensive WSGI web application library. Versions 3.1.5 and below, the safe_join function allows Windows device names as filenames if preceded by other path segments. This was previously reported as GHSA-hgf8-39gv-g3f2, but the added filtering failed to account for the fact that safe_join accepts paths with multiple segments, such as example/NUL. The function send_from_directory uses safe_join to safely serve files at user-specified paths under a directory. If the application is running on Windows, and the requested path ends with a special device name, the file will be opened successfully, but reading will hang indefinitely. This issue has been fixed in version 3.1.6.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
palletsprojectswerkzeug
𝑥
< 3.1.6
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
python-werkzeug
bookworm
2.2.2-3+deb12u1
fixed
bullseye
1.0.1+dfsg1-2+deb11u1
fixed
bullseye (security)
1.0.1+dfsg1-2+deb11u2
fixed
forky
3.1.5-1
fixed
sid
3.1.5-1
fixed
trixie
3.1.3-2
fixed