CVE-2026-27199
MEDIUMWerkzeug <=3.1.5 - Path Traversal
Title source: llmDescription
Werkzeug is a comprehensive WSGI web application library. Versions 3.1.5 and below, the safe_join function allows Windows device names as filenames if preceded by other path segments. This was previously reported as GHSA-hgf8-39gv-g3f2, but the added filtering failed to account for the fact that safe_join accepts paths with multiple segments, such as example/NUL. The function send_from_directory uses safe_join to safely serve files at user-specified paths under a directory. If the application is running on Windows, and the requested path ends with a special device name, the file will be opened successfully, but reading will hang indefinitely. This issue has been fixed in version 3.1.6.
Exploits (2)
github
WORKING POC
10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-27199
nomisec
WORKING POC
by alimezar · poc
https://github.com/alimezar/CVE-2026-27199-werkzeug-safe-join-bypass-PoC
Scores
CVSS v3
5.3
EPSS
0.0002
EPSS Percentile
5.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Details
CWE
CWE-67
Status
published
Products (2)
palletsprojects/werkzeug
< 3.1.6
pypi/werkzeug
0 - 3.1.6PyPI
Published
Feb 21, 2026
Tracked Since
Feb 21, 2026