Path traversal in Mako - CVE-2026-41205

 

Path traversal in Mako - CVE-2026-41205

Published: April 28, 2026


Vulnerability identifier: #VU128398
CSH Severity: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2026-41205
CWE-ID: CWE-22
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Mako
Software vendor:
SQLAlchemy

Description

The vulnerability allows a remote attacker to disclose sensitive information.

The vulnerability exists due to path traversal in TemplateLookup.get_template() when processing a URI that starts with a double-slash prefix. A remote attacker can supply a specially crafted template URI to disclose sensitive information.

Exploitation requires an application to pass untrusted input directly to the vulnerable API, and HTTP-based exploitation depends on a server that does not normalize double-slash-prefixed paths.


Remediation

Install security update from vendor's website.

External links