We found results for “”
CVE-2026-21860
Good to know:
Date: January 8, 2026
Werkzeug is a comprehensive WSGI web application library. Prior to version 3.1.5, Werkzeug's safe_join function allows path segments with Windows device names that have file extensions or trailing spaces. On Windows, there are special device names such as CON, AUX, etc that are implicitly present and readable in every directory. Windows still accepts them with any file extension, such as CON.txt, or trailing spaces such as CON. This issue has been patched in version 3.1.5.
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Improper Handling of Windows Device Names
CWE-67Top Fix
Upgrade Version
Upgrade to version werkzeug - 3.1.5;https://github.com/pallets/werkzeug.git - 3.1.5
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | NONE |
| Availability (A): | LOW |
Vulnerabilities
Projects
Contact Us


