CVE-2026-21860

NameCVE-2026-21860
DescriptionWerkzeug is a comprehensive WSGI web application library. Prior to version 3.1.5, Werkzeug's safe_join function allows path segments with Windows device names that have file extensions or trailing spaces. On Windows, there are special device names such as CON, AUX, etc that are implicitly present and readable in every directory. Windows still accepts them with any file extension, such as CON.txt, or trailing spaces such as CON. This issue has been patched in version 3.1.5.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-werkzeug (PTS)bullseye1.0.1+dfsg1-2+deb11u1fixed
bullseye (security)1.0.1+dfsg1-2+deb11u2fixed
bookworm2.2.2-3+deb12u1fixed
trixie3.1.3-2fixed
forky, sid3.1.4-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-werkzeugsource(unstable)(not affected)

Notes

- python-werkzeug <not-affected> (Only affects werkzeug on Windows)
https://github.com/pallets/werkzeug/security/advisories/GHSA-87hc-h4r5-73f7
Fixed by: https://github.com/pallets/werkzeug/commit/37797aba260022c871718e0908b472727d366d09 (3.1.5)

Search for package or bug name: Reporting problems