Description
Werkzeug is a comprehensive WSGI web application library. Browsers may allow "nameless" cookies that look like `=value` instead of `key=value`. A vulnerable browser may allow a compromised application on an adjacent subdomain to exploit this to set a cookie like `=__Host-test=bad` for another subdomain. Werkzeug prior to 2.2.3 will parse the cookie `=__Host-test=bad` as __Host-test=bad`. If a Werkzeug application is running next to a vulnerable or malicious subdomain which sets such a cookie using a vulnerable browser, the Werkzeug application will see the bad cookie value but the valid cookie key. The issue is fixed in Werkzeug 2.2.3.
References (5)
Core 5
Core References
Release Notes x_refsource_misc
https://github.com/pallets/werkzeug/releases/tag/2.2.3
Third Party Advisory
https://www.debian.org/security/2023/dsa-5470
Vendor Advisory
https://security.netapp.com/advisory/ntap-20230818-0003/
Vendor Advisory x_refsource_confirm
https://github.com/pallets/werkzeug/security/advisories/GHSA-px8h-6qxv-m22q
Scores
CVSS v3
2.6
EPSS
0.0027
EPSS Percentile
50.1%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-20
Status
published
Products (2)
palletsprojects/werkzeug
< 2.2.3
pypi/Werkzeug
0 - 2.2.3PyPI
Published
Feb 14, 2023
Tracked Since
Feb 18, 2026