PyPi: Flask-Cors

CVE-2024-6866

Safety vulnerability ID: 76237

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Mar 20, 2025 Updated at Aug 11, 2025
Scan your Python projects for vulnerabilities →

Advisory

Affected versions of the flask‑cors package are vulnerable to Improper Handling of Case Sensitivity due to case‑insensitive request path matching caused by using the try_match function, originally intended for hostnames. The cors_after_request logic applies unquote_plus to request.path and then uses try_match_pattern with caseSensitive=True only in patched versions, whereas the vulnerable behaviour uses try_match (case‑insensitive), resulting in mismatches between the intended case‑sensitive URL paths and the CORS matching. An attacker can exploit this by crafting requests with differently cased path segments that bypass restrictions on sensitive endpoints, enabling unauthorized cross‑origin access and potential data exposure.

Affected package

flask-cors

Latest version: 6.0.1

A Flask extension simplifying CORS support

Affected versions

Fixed versions

Vulnerability changelog

This vulnerability has no description

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

HIGH 7.5

CVSS v3 Details

HIGH 7.5
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
NONE
Availability Availability (A)
NONE