Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. flask-cors
  4. ›
  5. CVE-2024-6839

CVE-2024-6839: Flask-CORS improper regex path matching vulnerability

March 20, 2025 (updated March 22, 2025)

corydolphin/flask-cors version 4.0.1 contains an improper regex path matching vulnerability. The plugin prioritizes longer regex patterns over more specific ones when matching paths, which can lead to less restrictive CORS policies being applied to sensitive endpoints. This mismatch in regex pattern priority allows unauthorized cross-origin access to sensitive data or functionality, potentially exposing confidential information and increasing the risk of unauthorized actions by malicious actors.

References

  • github.com/advisories/GHSA-7rxf-gvfg-47g4
  • github.com/corydolphin/flask-cors
  • huntr.com/bounties/403eb1fc-86f4-4820-8eba-0f3dfae9f2b4
  • nvd.nist.gov/vuln/detail/CVE-2024-6839

Code Behaviors & Features

Detect and mitigate CVE-2024-6839 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 4.0.1

Solution

Unfortunately, there is no solution available yet.

Impact 4.3 MEDIUM

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-41: Improper Resolution of Path Equivalence

Source file

pypi/flask-cors/CVE-2024-6839.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:35 +0000.