Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-2h4p-vjrc-8xpq | Mako vulnerable to path traversal via backslash URI on Windows in TemplateLookup |
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sqlalchemy
Sqlalchemy mako |
|
| Vendors & Products |
Sqlalchemy
Sqlalchemy mako |
Tue, 12 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Mako is a template library written in Python. Prior to 1.3.12, on Windows, a URI using backslash traversal (e.g. \..\..\ secret.txt) bypasses the directory traversal check in Template.__init__ and the posixpath-based normalization in TemplateLookup.get_template(), allowing reads of files outside the configured template directory. This vulnerability is fixed in 1.3.12. | |
| Title | Mako: Path traversal via backslash URI on Windows in TemplateLookup | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T15:00:13.642Z
Reserved: 2026-05-05T19:00:06.021Z
Link: CVE-2026-44307
Updated: 2026-05-13T14:59:45.298Z
Status : Deferred
Published: 2026-05-12T22:16:37.567
Modified: 2026-05-13T18:15:26.870
Link: CVE-2026-44307
No data.
OpenCVE Enrichment
Updated: 2026-05-12T23:45:25Z
Github GHSA