CVE-2024-6839

corydolphin/flask-cors version 4.0.1 contains an improper regex path matching vulnerability. The plugin prioritizes longer regex patterns over more specific ones when matching paths, which can lead to less restrictive CORS policies being applied to sensitive endpoints. This mismatch in regex pattern priority allows unauthorized cross-origin access to sensitive data or functionality, potentially exposing confidential information and increasing the risk of unauthorized actions by malicious actors.
References
Link Resource
https://huntr.com/bounties/403eb1fc-86f4-4820-8eba-0f3dfae9f2b4 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:flask-cors_project:flask-cors:4.0.1:*:*:*:*:*:*:*

History

01 Aug 2025, 12:26

Type Values Removed Values Added
First Time Flask-cors Project flask-cors
Flask-cors Project
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
References () https://huntr.com/bounties/403eb1fc-86f4-4820-8eba-0f3dfae9f2b4 - () https://huntr.com/bounties/403eb1fc-86f4-4820-8eba-0f3dfae9f2b4 - Exploit, Third Party Advisory
CPE cpe:2.3:a:flask-cors_project:flask-cors:4.0.1:*:*:*:*:*:*:*

20 Mar 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-20 10:15

Updated : 2025-08-01 12:26


NVD link : CVE-2024-6839

Mitre link : CVE-2024-6839


JSON object : View

Products Affected

flask-cors_project

  • flask-cors
CWE
CWE-41

Improper Resolution of Path Equivalence