Safety vulnerability ID: 76237
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of the flask‑cors package are vulnerable to Improper Handling of Case Sensitivity due to case‑insensitive request path matching caused by using the try_match function, originally intended for hostnames. The cors_after_request logic applies unquote_plus to request.path and then uses try_match_pattern with caseSensitive=True only in patched versions, whereas the vulnerable behaviour uses try_match (case‑insensitive), resulting in mismatches between the intended case‑sensitive URL paths and the CORS matching. An attacker can exploit this by crafting requests with differently cased path segments that bypass restrictions on sensitive endpoints, enabling unauthorized cross‑origin access and potential data exposure.
Latest version: 6.0.1
A Flask extension simplifying CORS support
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application