CVE-2026-44307
HIGHMako: Path traversal via backslash URI on Windows in TemplateLookup
Title source: cnaDescription
Mako is a template library written in Python. Prior to 1.3.12, on Windows, a URI using backslash traversal (e.g. \..\..\ secret.txt) bypasses the directory traversal check in Template.__init__ and the posixpath-based normalization in TemplateLookup.get_template(), allowing reads of files outside the configured template directory. This vulnerability is fixed in 1.3.12.
References (4)
Core 4
Core References
X_Refsource_Confirm x_refsource_confirm
https://github.com/sqlalchemy/mako/security/advisories/GHSA-2h4p-vjrc-8xpq
X_Refsource_Misc x_refsource_misc
https://github.com/sqlalchemy/mako/issues/435
X_Refsource_Misc x_refsource_misc
https://github.com/sqlalchemy/mako/commit/72e10c573ca0fbcbddd4455abca8ce92a61780d7
X_Refsource_Misc x_refsource_misc
https://github.com/sqlalchemy/mako/releases/tag/rel_1_3_12
Scores
CVSS v4
8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Details
CWE
CWE-22
Status
published
Products (1)
sqlalchemy/mako
< 1.3.12
Published
May 12, 2026
Tracked Since
May 13, 2026