Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-65mp-fq8v-56jr | Flask-Reuploaded vulnerable to Remote Code Execution via Server-Side Template Injection |
Fri, 27 Feb 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:jugmac00:flask-reuploaded:*:*:*:*:*:python:*:* |
Wed, 25 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Feb 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jugmac00
Jugmac00 flask-reuploaded |
|
| Vendors & Products |
Jugmac00
Jugmac00 flask-reuploaded |
Wed, 25 Feb 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Flask-Reuploaded provides file uploads for Flask. A critical path traversal and extension bypass vulnerability in versions prior to 1.5.0 allows remote attackers to achieve arbitrary file write and remote code execution through Server-Side Template Injection (SSTI). Flask-Reuploaded has been patched in version 1.5.0. Some workarounds are available. Do not pass user input to the `name` parameter, use auto-generated filenames only, and implement strict input validation if `name` must be used. | |
| Title | Flask-Reuploaded vulnerable to Remote Code Execution via Server-Side Template Injection | |
| Weaknesses | CWE-1336 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-25T21:12:45.608Z
Reserved: 2026-02-20T22:02:30.029Z
Link: CVE-2026-27641
Updated: 2026-02-25T21:12:38.828Z
Status : Analyzed
Published: 2026-02-25T04:16:04.620
Modified: 2026-02-27T18:40:20.083
Link: CVE-2026-27641
No data.
OpenCVE Enrichment
Updated: 2026-04-17T15:30:06Z
Github GHSA