Description

A vulnerability in corydolphin/flask-cors version 4.0.1 allows for inconsistent CORS matching due to the handling of the '+' character in URL paths. The request.path is passed through the unquote_plus function, which converts the '+' character to a space ' '. This behavior leads to incorrect path normalization, causing potential mismatches in CORS configuration. As a result, endpoints may not be matched correctly to their CORS settings, leading to unexpected CORS policy application. This can cause unauthorized cross-origin access or block valid requests, creating security vulnerabilities and usability issues.

INFO

Published Date :

2025-03-20T10:10:51.818Z

Last Modified :

2025-11-03T19:34:40.918Z

Source :

@huntr_ai
AFFECTED PRODUCTS

The following products are affected by CVE-2024-6844 vulnerability.

Vendors Products
Corydolphin
  • Flask-cors
Flask-cors Project
  • Flask-cors
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-6844.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact