CVE-2026-27199

MEDIUM

Werkzeug <=3.1.5 - Path Traversal

Title source: llm

Description

Werkzeug is a comprehensive WSGI web application library. Versions 3.1.5 and below, the safe_join function allows Windows device names as filenames if preceded by other path segments. This was previously reported as GHSA-hgf8-39gv-g3f2, but the added filtering failed to account for the fact that safe_join accepts paths with multiple segments, such as example/NUL. The function send_from_directory uses safe_join to safely serve files at user-specified paths under a directory. If the application is running on Windows, and the requested path ends with a special device name, the file will be opened successfully, but reading will hang indefinitely. This issue has been fixed in version 3.1.6.

Exploits (2)

github WORKING POC 10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-27199
nomisec WORKING POC
by alimezar · poc
https://github.com/alimezar/CVE-2026-27199-werkzeug-safe-join-bypass-PoC

Scores

CVSS v3 5.3
EPSS 0.0002
EPSS Percentile 5.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Details

CWE
CWE-67
Status published
Products (2)
palletsprojects/werkzeug < 3.1.6
pypi/werkzeug 0 - 3.1.6PyPI
Published Feb 21, 2026
Tracked Since Feb 21, 2026