Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 17 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ryandfir
Ryandfir unfurl |
|
| CPEs | cpe:2.3:a:ryandfir:unfurl:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Ryandfir
Ryandfir unfurl |
Thu, 09 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 09 Apr 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dfir-unfurl
Dfir-unfurl dfir-unfurl |
|
| Vendors & Products |
Dfir-unfurl
Dfir-unfurl dfir-unfurl |
Wed, 08 Apr 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | dfir-unfurl through 20250810 contains an improper input validation vulnerability in config parsing that enables Flask debug mode by default. The debug configuration value is read as a string and passed directly to app.run(), causing any non-empty string to evaluate truthy, allowing attackers to access the Werkzeug debugger and disclose sensitive information or achieve remote code execution. | Unfurl through 2025.08 contains an improper input validation vulnerability in config parsing that enables Flask debug mode by default. The debug configuration value is read as a string and passed directly to app.run(), causing any non-empty string to evaluate truthy, allowing attackers to access the Werkzeug debugger and disclose sensitive information or achieve remote code execution. |
| Title | dfir-unfurl - Werkzeug Debugger Exposure via String Config Parsing | Unfurl - Werkzeug Debugger Exposure via String Config Parsing |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 08 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | dfir-unfurl through 20250810 contains an improper input validation vulnerability in config parsing that enables Flask debug mode by default. The debug configuration value is read as a string and passed directly to app.run(), causing any non-empty string to evaluate truthy, allowing attackers to access the Werkzeug debugger and disclose sensitive information or achieve remote code execution. | |
| Title | dfir-unfurl - Werkzeug Debugger Exposure via String Config Parsing | |
| Weaknesses | CWE-489 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-08T14:07:04.785Z
Reserved: 2026-04-08T13:36:58.277Z
Link: CVE-2026-40035
Updated: 2026-04-09T13:19:39.771Z
Status : Analyzed
Published: 2026-04-08T22:16:24.010
Modified: 2026-04-17T16:03:26.810
Link: CVE-2026-40035
No data.
OpenCVE Enrichment
Updated: 2026-04-09T08:25:49Z