CVE-2024-6866Improper Handling of Case Sensitivity in Project Flask-cors

Severity
7.5HIGHNVD
EPSS
0.2%
top 62.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 20
Latest updateJul 2

Description

corydolphin/flask-cors version 4.01 contains a vulnerability where the request path matching is case-insensitive due to the use of the `try_match` function, which is originally intended for matching hosts. This results in a mismatch because paths in URLs are case-sensitive, but the regex matching treats them as case-insensitive. This misconfiguration can lead to significant security vulnerabilities, allowing unauthorized origins to access paths meant to be restricted, resulting in data exposure

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

🔴Vulnerability Details

5
OSV
python-flask-cors vulnerabilities2025-07-02
GHSA
Flask-CORS vulnerable to Improper Handling of Case Sensitivity2025-03-20
CVEList
Case-Insensitive Path Matching in corydolphin/flask-cors2025-03-20
OSV
Flask-CORS vulnerable to Improper Handling of Case Sensitivity2025-03-20
OSV
CVE-2024-6866: corydolphin/flask-cors version 42025-03-20

📋Vendor Advisories

2
Ubuntu
Flask-CORS vulnerabilities2025-07-02
Debian
CVE-2024-6866: python-flask-cors - corydolphin/flask-cors version 4.01 contains a vulnerability where the request p...2024
CVE-2024-6866 — Improper Handling of Case Sensitivity | cvebase