CVE-2024-6844Origin Validation Error in Project Flask-cors

Severity
5.3MEDIUMNVD
EPSS
0.1%
top 79.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 20
Latest updateJul 2

Description

A vulnerability in corydolphin/flask-cors version 4.0.1 allows for inconsistent CORS matching due to the handling of the '+' character in URL paths. The request.path is passed through the unquote_plus function, which converts the '+' character to a space ' '. This behavior leads to incorrect path normalization, causing potential mismatches in CORS configuration. As a result, endpoints may not be matched correctly to their CORS settings, leading to unexpected CORS policy application. This can cau

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages3 packages

🔴Vulnerability Details

4
OSV
Flask-CORS allows for inconsistent CORS matching2025-03-20
OSV
CVE-2024-6844: A vulnerability in corydolphin/flask-cors version 42025-03-20
CVEList
Inconsistent CORS Matching Due to Handling of '+' in URL Path in corydolphin/flask-cors2025-03-20
GHSA
Flask-CORS allows for inconsistent CORS matching2025-03-20

📋Vendor Advisories

2
Ubuntu
Flask-CORS vulnerabilities2025-07-02
Debian
CVE-2024-6844: python-flask-cors - A vulnerability in corydolphin/flask-cors version 4.0.1 allows for inconsistent ...2024
CVE-2024-6844 — Origin Validation Error | cvebase