Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:pypi/werkzeug@3.0.4
purl pkg:pypi/werkzeug@3.0.4
Next non-vulnerable version 3.1.6
Latest non-vulnerable version 3.1.6
Risk 3.4
Vulnerabilities affecting this package (5)
Vulnerability Summary Fixed by
VCID-19qx-5d4g-pfdn
Aliases:
CVE-2024-49766
GHSA-f9vj-2wh5-fj8j
Werkzeug safe_join not safe on Windows On Python < 3.11 on Windows, `os.path.isabs()` does not catch UNC paths like `//server/share`. Werkzeug's `safe_join()` relies on this check, and so can produce a path that is not safe, potentially allowing unintended access to data. Applications using Python >= 3.11, or not using Windows, are not vulnerable.
3.0.6
Affected by 3 other vulnerabilities.
VCID-3mxv-vxtj-8kde
Aliases:
CVE-2026-21860
GHSA-87hc-h4r5-73f7
Werkzeug safe_join() allows Windows special device names with compound extensions Werkzeug's `safe_join` function allows path segments with Windows device names that have file extensions or trailing spaces. On Windows, there are special device names such as `CON`, `AUX`, etc that are implicitly present and readable in every directory. Windows still accepts them with any file extension, such as `CON.txt`, or trailing spaces such as `CON `. This was previously reported as https://github.com/pallets/werkzeug/security/advisories/GHSA-hgf8-39gv-g3f2, but the fix failed to account for compound extensions such as `CON.txt.html` or trailing spaces. It also missed some additional special names. `send_from_directory` uses `safe_join` to safely serve files at user-specified paths under a directory. If the application is running on Windows, and the requested path ends with a special device name, the file will be opened successfully, but reading will hang indefinitely.
3.1.5
Affected by 1 other vulnerability.
VCID-6cpm-rdw8-7fh6
Aliases:
CVE-2025-66221
GHSA-hgf8-39gv-g3f2
Werkzeug safe_join() allows Windows special device names Werkzeug's `safe_join` function allows path segments with Windows device names. On Windows, there are special device names such as `CON`, `AUX`, etc that are implicitly present and readable in every directory. `send_from_directory` uses `safe_join` to safely serve files at user-specified paths under a directory. If the application is running on Windows, and the requested path ends with a special device name, the file will be opened successfully, but reading will hang indefinitely.
3.1.4
Affected by 2 other vulnerabilities.
VCID-jxz2-8tqb-mbeg
Aliases:
CVE-2026-27199
GHSA-29vq-49wr-vm6x
Werkzeug safe_join() allows Windows special device names Werkzeug's `safe_join` function allows Windows device names as filenames if when preceded by other path segments. This was previously reported as https://github.com/pallets/werkzeug/security/advisories/GHSA-hgf8-39gv-g3f2, but the added filtering failed to account for the fact that `safe_join` accepts paths with multiple segments, such as `example/NUL`. `send_from_directory` uses `safe_join` to safely serve files at user-specified paths under a directory. If the application is running on Windows, and the requested path ends with a special device name, the file will be opened successfully, but reading will hang indefinitely.
3.1.6
Affected by 0 other vulnerabilities.
VCID-myg8-m4rh-ruae
Aliases:
CVE-2024-49767
GHSA-q34m-jh98-gwm2
Werkzeug possible resource exhaustion when parsing file data in forms Applications using Werkzeug to parse `multipart/form-data` requests are vulnerable to resource exhaustion. A specially crafted form body can bypass the `Request.max_form_memory_size` setting. The `Request.max_content_length` setting, as well as resource limits provided by deployment software and platforms, are also available to limit the resources used during a request. This vulnerability does not affect those settings. All three types of limits should be considered and set appropriately when deploying an application.
3.0.6
Affected by 3 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-29T23:02:41.800386+00:00 GitLab Importer Affected by VCID-jxz2-8tqb-mbeg https://gitlab.com/gitlab-org/advisories-community/-/blob/main/pypi/Werkzeug/CVE-2026-27199.yml 38.5.0
2026-04-29T22:49:04.934472+00:00 GitLab Importer Affected by VCID-3mxv-vxtj-8kde https://gitlab.com/gitlab-org/advisories-community/-/blob/main/pypi/Werkzeug/CVE-2026-21860.yml 38.5.0
2026-04-29T22:43:37.441065+00:00 GitLab Importer Affected by VCID-6cpm-rdw8-7fh6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/pypi/Werkzeug/CVE-2025-66221.yml 38.5.0
2026-04-29T21:53:40.157515+00:00 GitLab Importer Affected by VCID-19qx-5d4g-pfdn https://gitlab.com/gitlab-org/advisories-community/-/blob/main/pypi/Werkzeug/CVE-2024-49766.yml 38.5.0
2026-04-29T21:53:39.264213+00:00 GitLab Importer Affected by VCID-myg8-m4rh-ruae https://gitlab.com/gitlab-org/advisories-community/-/blob/main/pypi/Werkzeug/CVE-2024-49767.yml 38.5.0
2026-04-17T00:19:35.770842+00:00 GitLab Importer Affected by VCID-jxz2-8tqb-mbeg https://gitlab.com/gitlab-org/advisories-community/-/blob/main/pypi/Werkzeug/CVE-2026-27199.yml 38.4.0
2026-04-17T00:06:30.169535+00:00 GitLab Importer Affected by VCID-3mxv-vxtj-8kde https://gitlab.com/gitlab-org/advisories-community/-/blob/main/pypi/Werkzeug/CVE-2026-21860.yml 38.4.0
2026-04-17T00:01:11.669746+00:00 GitLab Importer Affected by VCID-6cpm-rdw8-7fh6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/pypi/Werkzeug/CVE-2025-66221.yml 38.4.0
2026-04-16T23:12:22.983190+00:00 GitLab Importer Affected by VCID-19qx-5d4g-pfdn https://gitlab.com/gitlab-org/advisories-community/-/blob/main/pypi/Werkzeug/CVE-2024-49766.yml 38.4.0
2026-04-16T23:12:22.123712+00:00 GitLab Importer Affected by VCID-myg8-m4rh-ruae https://gitlab.com/gitlab-org/advisories-community/-/blob/main/pypi/Werkzeug/CVE-2024-49767.yml 38.4.0
2026-04-12T01:43:59.265267+00:00 GitLab Importer Affected by VCID-jxz2-8tqb-mbeg https://gitlab.com/gitlab-org/advisories-community/-/blob/main/pypi/Werkzeug/CVE-2026-27199.yml 38.3.0
2026-04-12T01:29:50.873329+00:00 GitLab Importer Affected by VCID-3mxv-vxtj-8kde https://gitlab.com/gitlab-org/advisories-community/-/blob/main/pypi/Werkzeug/CVE-2026-21860.yml 38.3.0
2026-04-12T01:24:06.820876+00:00 GitLab Importer Affected by VCID-6cpm-rdw8-7fh6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/pypi/Werkzeug/CVE-2025-66221.yml 38.3.0
2026-04-12T00:30:50.563080+00:00 GitLab Importer Affected by VCID-19qx-5d4g-pfdn https://gitlab.com/gitlab-org/advisories-community/-/blob/main/pypi/Werkzeug/CVE-2024-49766.yml 38.3.0
2026-04-12T00:30:49.619921+00:00 GitLab Importer Affected by VCID-myg8-m4rh-ruae https://gitlab.com/gitlab-org/advisories-community/-/blob/main/pypi/Werkzeug/CVE-2024-49767.yml 38.3.0
2026-04-03T01:52:50.897645+00:00 GitLab Importer Affected by VCID-jxz2-8tqb-mbeg https://gitlab.com/gitlab-org/advisories-community/-/blob/main/pypi/Werkzeug/CVE-2026-27199.yml 38.1.0
2026-04-03T01:38:36.905820+00:00 GitLab Importer Affected by VCID-3mxv-vxtj-8kde https://gitlab.com/gitlab-org/advisories-community/-/blob/main/pypi/Werkzeug/CVE-2026-21860.yml 38.1.0
2026-04-03T01:32:45.702120+00:00 GitLab Importer Affected by VCID-6cpm-rdw8-7fh6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/pypi/Werkzeug/CVE-2025-66221.yml 38.1.0
2026-04-03T00:38:30.439949+00:00 GitLab Importer Affected by VCID-19qx-5d4g-pfdn https://gitlab.com/gitlab-org/advisories-community/-/blob/main/pypi/Werkzeug/CVE-2024-49766.yml 38.1.0
2026-04-03T00:38:29.507272+00:00 GitLab Importer Affected by VCID-myg8-m4rh-ruae https://gitlab.com/gitlab-org/advisories-community/-/blob/main/pypi/Werkzeug/CVE-2024-49767.yml 38.1.0