Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-wp53-j4wj-2cfg | Python-Multipart has Arbitrary File Write via Non-Default Configuration |
Ubuntu USN |
USN-8027-1 | Python-Multipart vulnerabilities |
Tue, 17 Feb 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fastapiexpert
Fastapiexpert python-multipart |
|
| CPEs | cpe:2.3:a:fastapiexpert:python-multipart:*:*:*:*:*:python:*:* | |
| Vendors & Products |
Fastapiexpert
Fastapiexpert python-multipart |
Wed, 28 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 27 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 27 Jan 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kludex
Kludex python-multipart |
|
| Vendors & Products |
Kludex
Kludex python-multipart |
Tue, 27 Jan 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Python-Multipart is a streaming multipart parser for Python. Prior to version 0.0.22, a Path Traversal vulnerability exists when using non-default configuration options `UPLOAD_DIR` and `UPLOAD_KEEP_FILENAME=True`. An attacker can write uploaded files to arbitrary locations on the filesystem by crafting a malicious filename. Users should upgrade to version 0.0.22 to receive a patch or, as a workaround, avoid using `UPLOAD_KEEP_FILENAME=True` in project configurations. | |
| Title | Python-Multipart has Arbitrary File Write via Non-Default Configuration | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-27T20:51:06.407Z
Reserved: 2026-01-23T00:38:20.548Z
Link: CVE-2026-24486
Updated: 2026-01-27T20:51:01.362Z
Status : Analyzed
Published: 2026-01-27T01:16:02.303
Modified: 2026-02-17T20:44:50.210
Link: CVE-2026-24486
OpenCVE Enrichment
Updated: 2026-04-18T02:45:27Z
Github GHSA
Ubuntu USN