Description
Flask-Reuploaded provides file uploads for Flask. A critical path traversal and extension bypass vulnerability in versions prior to 1.5.0 allows remote attackers to achieve arbitrary file write and remote code execution through Server-Side Template Injection (SSTI). Flask-Reuploaded has been patched in version 1.5.0. Some workarounds are available. Do not pass user input to the `name` parameter, use auto-generated filenames only, and implement strict input validation if `name` must be used.
Published: 2026-02-25
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Immediately
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-65mp-fq8v-56jr Flask-Reuploaded vulnerable to Remote Code Execution via Server-Side Template Injection
History

Fri, 27 Feb 2026 18:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22
CPEs cpe:2.3:a:jugmac00:flask-reuploaded:*:*:*:*:*:python:*:*

Wed, 25 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Jugmac00
Jugmac00 flask-reuploaded
Vendors & Products Jugmac00
Jugmac00 flask-reuploaded

Wed, 25 Feb 2026 04:15:00 +0000

Type Values Removed Values Added
Description Flask-Reuploaded provides file uploads for Flask. A critical path traversal and extension bypass vulnerability in versions prior to 1.5.0 allows remote attackers to achieve arbitrary file write and remote code execution through Server-Side Template Injection (SSTI). Flask-Reuploaded has been patched in version 1.5.0. Some workarounds are available. Do not pass user input to the `name` parameter, use auto-generated filenames only, and implement strict input validation if `name` must be used.
Title Flask-Reuploaded vulnerable to Remote Code Execution via Server-Side Template Injection
Weaknesses CWE-1336
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Jugmac00 Flask-reuploaded
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-25T21:12:45.608Z

Reserved: 2026-02-20T22:02:30.029Z

Link: CVE-2026-27641

cve-icon Vulnrichment

Updated: 2026-02-25T21:12:38.828Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T04:16:04.620

Modified: 2026-02-27T18:40:20.083

Link: CVE-2026-27641

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T15:30:06Z

Weaknesses