Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-ypj9-hez8-qbcs
Summary
Flask uses fallback key instead of current signing key
In Flask 3.1.0, the way fallback key configuration was handled resulted in the last fallback key being used for signing, rather than the current signing key.

Signing is provided by the `itsdangerous` library. A list of keys can be passed, and it expects the last (top) key in the list to be the most recent key, and uses that for signing. Flask was incorrectly constructing that list in reverse, passing the signing key first.

Sites that have opted-in to use key rotation by setting `SECRET_KEY_FALLBACKS` are likely to unexpectedly be signing their sessions with stale keys, and their transition to fresher keys will be impeded. Sessions are still signed, so this would not cause any sort of data integrity loss.
Aliases
0
alias CVE-2025-47278
1
alias GHSA-4grg-w6v8-c28g
Fixed_packages
0
url pkg:deb/debian/flask@0?distro=trixie
purl pkg:deb/debian/flask@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/flask@0%3Fdistro=trixie
1
url pkg:deb/debian/flask@1.1.2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/flask@1.1.2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-rx8q-6dwq-a3hs
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/flask@1.1.2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/flask@2.2.2-3?distro=trixie
purl pkg:deb/debian/flask@2.2.2-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-rx8q-6dwq-a3hs
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/flask@2.2.2-3%3Fdistro=trixie
3
url pkg:deb/debian/flask@3.1.1-1?distro=trixie
purl pkg:deb/debian/flask@3.1.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-rx8q-6dwq-a3hs
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/flask@3.1.1-1%3Fdistro=trixie
4
url pkg:deb/debian/flask@3.1.2-1?distro=trixie
purl pkg:deb/debian/flask@3.1.2-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-rx8q-6dwq-a3hs
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/flask@3.1.2-1%3Fdistro=trixie
5
url pkg:deb/debian/flask@3.1.3-1?distro=trixie
purl pkg:deb/debian/flask@3.1.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/flask@3.1.3-1%3Fdistro=trixie
6
url pkg:pypi/flask@3.1.1
purl pkg:pypi/flask@3.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-rx8q-6dwq-a3hs
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/flask@3.1.1
Affected_packages
0
url pkg:pypi/flask@3.1.0
purl pkg:pypi/flask@3.1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-rx8q-6dwq-a3hs
1
vulnerability VCID-ypj9-hez8-qbcs
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/flask@3.1.0
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47278.json
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47278.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-47278
reference_id
reference_type
scores
0
value 0.00106
scoring_system epss
scoring_elements 0.2836
published_at 2026-04-26T12:55:00Z
1
value 0.00106
scoring_system epss
scoring_elements 0.28472
published_at 2026-04-24T12:55:00Z
2
value 0.00106
scoring_system epss
scoring_elements 0.28585
published_at 2026-04-21T12:55:00Z
3
value 0.00106
scoring_system epss
scoring_elements 0.28634
published_at 2026-04-18T12:55:00Z
4
value 0.00106
scoring_system epss
scoring_elements 0.28659
published_at 2026-04-16T12:55:00Z
5
value 0.00106
scoring_system epss
scoring_elements 0.28639
published_at 2026-04-13T12:55:00Z
6
value 0.00106
scoring_system epss
scoring_elements 0.28731
published_at 2026-04-11T12:55:00Z
7
value 0.00106
scoring_system epss
scoring_elements 0.28726
published_at 2026-04-09T12:55:00Z
8
value 0.00106
scoring_system epss
scoring_elements 0.28815
published_at 2026-04-04T12:55:00Z
9
value 0.00106
scoring_system epss
scoring_elements 0.28768
published_at 2026-04-02T12:55:00Z
10
value 0.00106
scoring_system epss
scoring_elements 0.28687
published_at 2026-04-12T12:55:00Z
11
value 0.00106
scoring_system epss
scoring_elements 0.28622
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-47278
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/pallets/flask
reference_id
reference_type
scores
0
value 1.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/pallets/flask
4
reference_url https://github.com/pallets/flask/commit/73d6504063bfa00666a92b07a28aaf906c532f09
reference_id
reference_type
scores
0
value 1.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:13:56Z/
url https://github.com/pallets/flask/commit/73d6504063bfa00666a92b07a28aaf906c532f09
5
reference_url https://github.com/pallets/flask/releases/tag/3.1.1
reference_id
reference_type
scores
0
value 1.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:13:56Z/
url https://github.com/pallets/flask/releases/tag/3.1.1
6
reference_url https://github.com/pallets/flask/security/advisories/GHSA-4grg-w6v8-c28g
reference_id
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
1
value 1.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:13:56Z/
url https://github.com/pallets/flask/security/advisories/GHSA-4grg-w6v8-c28g
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-47278
reference_id
reference_type
scores
0
value 1.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-47278
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105794
reference_id 1105794
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105794
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2365965
reference_id 2365965
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2365965
10
reference_url https://github.com/advisories/GHSA-4grg-w6v8-c28g
reference_id GHSA-4grg-w6v8-c28g
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4grg-w6v8-c28g
11
reference_url https://usn.ubuntu.com/7534-1/
reference_id USN-7534-1
reference_type
scores
url https://usn.ubuntu.com/7534-1/
Weaknesses
0
cwe_id 683
name Function Call With Incorrect Order of Arguments
description The product calls a function, procedure, or routine, but the caller specifies the arguments in an incorrect order, leading to resultant weaknesses.
1
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
2
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
Exploits
Severity_range_score0.1 - 3
Exploitability0.5
Weighted_severity2.7
Risk_score1.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-ypj9-hez8-qbcs