Safety vulnerability ID: 71925
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Lektor affected versions does not sanitize DB path traversal. Thus, shell commands might be executed via a file that is added to the templates directory, if the victim's web browser accesses an untrusted website that uses JavaScript to send requests to localhost port 5000, and the web browser is running on the same machine as the "lektor server" command.
Latest version: 3.3.12
A static content management system.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application