PyPi: Flask-Cors

CVE-2024-6844

Safety vulnerability ID: 76242

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Mar 20, 2025 Updated at Aug 08, 2025
Scan your Python projects for vulnerabilities →

Advisory

Affected versions of the flask-cors package are vulnerable to Improper Input Validation due to inconsistent URL path handling when processing the '+' character. The package incorrectly uses the unquote_plus function on request.path, which converts '+' characters to spaces, resulting in path normalization errors that prevent proper CORS policy matching for endpoints containing '+' symbols. An attacker can exploit this vulnerability by accessing endpoints with '+' characters in their paths to bypass intended CORS restrictions or cause legitimate cross-origin requests to be incorrectly blocked, potentially exposing sensitive data to unauthorized origins or disrupting application functionality.

Affected package

flask-cors

Latest version: 6.0.1

A Flask extension simplifying CORS support

Affected versions

Fixed versions

Vulnerability changelog

This vulnerability has no description

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application