CVE-2024-6839Improper Resolution of Path Equivalence in Project Flask-cors

Severity
5.3MEDIUMNVD
EPSS
0.3%
top 47.87%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 20
Latest updateJul 2

Description

corydolphin/flask-cors version 4.0.1 contains an improper regex path matching vulnerability. The plugin prioritizes longer regex patterns over more specific ones when matching paths, which can lead to less restrictive CORS policies being applied to sensitive endpoints. This mismatch in regex pattern priority allows unauthorized cross-origin access to sensitive data or functionality, potentially exposing confidential information and increasing the risk of unauthorized actions by malicious actors.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages3 packages

🔴Vulnerability Details

5
OSV
python-flask-cors vulnerabilities2025-07-02
GHSA
Flask-CORS improper regex path matching vulnerability2025-03-20
OSV
CVE-2024-6839: corydolphin/flask-cors version 42025-03-20
OSV
Flask-CORS improper regex path matching vulnerability2025-03-20
CVEList
Improper Regex Path Matching in corydolphin/flask-cors2025-03-20

📋Vendor Advisories

2
Ubuntu
Flask-CORS vulnerabilities2025-07-02
Debian
CVE-2024-6839: python-flask-cors - corydolphin/flask-cors version 4.0.1 contains an improper regex path matching vu...2024
CVE-2024-6839 — Improper Resolution of Path Equivalence | cvebase