Description

Python-Multipart is a streaming multipart parser for Python. Prior to version 0.0.22, a Path Traversal vulnerability exists when using non-default configuration options `UPLOAD_DIR` and `UPLOAD_KEEP_FILENAME=True`. An attacker can write uploaded files to arbitrary locations on the filesystem by crafting a malicious filename. Users should upgrade to version 0.0.22 to receive a patch or, as a workaround, avoid using `UPLOAD_KEEP_FILENAME=True` in project configurations.

INFO

Published Date :

2026-01-27T00:34:06.229Z

Last Modified :

2026-01-27T20:51:06.407Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-24486 vulnerability.

Vendors Products
Fastapiexpert
  • Python-multipart
Kludex
  • Python-multipart

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact