SB2026030562 - Improper Handling of Windows Device Names in Werkzeug



SB2026030562 - Improper Handling of Windows Device Names in Werkzeug

Published: March 5, 2026

Security Bulletin ID SB2026030562
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Improper Handling of Windows Device Names (CVE-ID: CVE-2026-21860)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to safe_join function allows path segments with Windows device names that have file extensions or trailing spaces. On Windows, there are special device names such as CON, AUX, etc that are implicitly present and readable in every directory. Windows still accepts them with any file extension, such as CON.txt, or trailing spaces such as CON. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.



Remediation

Install update from vendor's website.