Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27641: CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine in jugmac00 flask-reuploaded

0
Critical
VulnerabilityCVE-2026-27641cvecve-2026-27641cwe-1336
Published: Wed Feb 25 2026 (02/25/2026, 03:54:54 UTC)
Source: CVE Database V5
Vendor/Project: jugmac00
Product: flask-reuploaded

Description

Flask-Reuploaded provides file uploads for Flask. A critical path traversal and extension bypass vulnerability in versions prior to 1.5.0 allows remote attackers to achieve arbitrary file write and remote code execution through Server-Side Template Injection (SSTI). Flask-Reuploaded has been patched in version 1.5.0. Some workarounds are available. Do not pass user input to the `name` parameter, use auto-generated filenames only, and implement strict input validation if `name` must be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 20:35:30 UTC

Technical Analysis

CVE-2026-27641 affects flask-reuploaded, a Flask extension that facilitates file uploads. The vulnerability arises from improper neutralization of special elements used in the template engine, classified under CWE-1336. This flaw enables a critical path traversal and extension bypass, allowing attackers to manipulate file paths and extensions during upload processing. Consequently, attackers can achieve arbitrary file writes on the server, which can be leveraged to execute malicious code remotely via Server-Side Template Injection (SSTI). The vulnerability affects all versions prior to 1.5.0 and requires no authentication or user interaction, making it highly exploitable over the network. The root cause is the unsafe handling of the 'name' parameter, which if populated with user input, can be exploited to inject malicious template code or traverse directories. The maintainers have patched this issue in flask-reuploaded 1.5.0. Until patching, recommended workarounds include never passing user input directly to the 'name' parameter, relying on auto-generated filenames, and enforcing strict validation on any user-supplied input used in filenames. This vulnerability poses a severe risk to web applications relying on flask-reuploaded for file uploads, as it compromises confidentiality, integrity, and availability by enabling remote code execution and arbitrary file manipulation.

Potential Impact

The impact of CVE-2026-27641 is severe for organizations worldwide using flask-reuploaded in their Flask-based web applications. Exploitation allows attackers to write arbitrary files to the server, potentially overwriting critical files or uploading malicious payloads. This can lead to full remote code execution, enabling attackers to take complete control of affected systems. The breach of confidentiality can occur through unauthorized access to sensitive files, while integrity is compromised by unauthorized modifications. Availability may be disrupted if attackers delete or corrupt essential files or deploy ransomware. Given the ease of exploitation without authentication or user interaction, the vulnerability significantly increases the attack surface for web applications. Organizations in sectors such as finance, healthcare, e-commerce, and government, which often use Flask for web services, face heightened risks of data breaches, service disruption, and reputational damage. The critical CVSS score of 9.8 reflects the high likelihood and impact of exploitation.

Mitigation Recommendations

To mitigate CVE-2026-27641, organizations should immediately upgrade flask-reuploaded to version 1.5.0 or later, where the vulnerability is patched. Until upgrading is possible, do not pass any user-supplied input to the 'name' parameter in file upload functions; instead, use auto-generated filenames to prevent injection of malicious template code or path traversal sequences. Implement strict input validation and sanitization if the 'name' parameter must be used, ensuring it does not contain special characters, directory traversal patterns, or template syntax. Conduct thorough code reviews and security testing focusing on file upload handling and template rendering logic. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) with rules targeting SSTI and path traversal attempts to detect and block exploitation attempts. Monitor application logs for suspicious file upload activities and unexpected template errors. Finally, educate developers about secure file upload practices and the risks of injecting user input into template engines.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T22:02:30.029Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699e7673b7ef31ef0bd379c0

Added to database: 2/25/2026, 4:11:31 AM

Last enriched: 3/4/2026, 8:35:30 PM

Last updated: 4/12/2026, 7:57:21 AM

Views: 122

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses