Upstream information

CVE-2024-6839 at MITRE

Description

corydolphin/flask-cors version 4.0.1 contains an improper regex path matching vulnerability. The plugin prioritizes longer regex patterns over more specific ones when matching paths, which can lead to less restrictive CORS policies being applied to sensitive endpoints. This mismatch in regex pattern priority allows unauthorized cross-origin access to sensitive data or functionality, potentially exposing confidential information and increasing the risk of unauthorized actions by malicious actors.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v3 Scores
CVSS detail CNA (Huntr.dev) National Vulnerability Database
Base Score 4.3 5.3
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack Vector Network Network
Attack Complexity Low Low
Privileges Required None None
User Interaction Required None
Scope Unchanged Unchanged
Confidentiality Impact Low Low
Integrity Impact None None
Availability Impact None None
CVSSv3 Version 3 3.1
SUSE Bugzilla entry: 1239846 [NEW]

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
openSUSE Tumbleweed
  • python311-Flask-Cors >= 6.0.2-1.1
  • python313-Flask-Cors >= 6.0.2-1.1
  • python314-Flask-Cors >= 6.0.2-1.1
Patchnames:
openSUSE-Tumbleweed-2026-10485


SUSE Timeline for this CVE

CVE page created: Thu Mar 20 12:01:23 2025
CVE page last modified: Sat Apr 4 01:16:41 2026