{"id":"CVE-2020-25032","details":"An issue was discovered in Flask-CORS (aka CORS Middleware for Flask) before 3.0.9. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format.","aliases":["GHSA-xc3p-ff3m-f46v","PYSEC-2020-43"],"modified":"2026-03-20T11:35:11.184659Z","published":"2020-08-31T04:15:12.060Z","related":["SUSE-SU-2020:2876-1","SUSE-SU-2020:3309-1","openSUSE-SU-2020:1393-1","openSUSE-SU-2020:1415-1","openSUSE-SU-2020:1423-1","openSUSE-SU-2020:1446-1","openSUSE-SU-2024:11206-1","openSUSE-SU-2024:14129-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00048.html"},{"type":"ADVISORY","url":"https://github.com/corydolphin/flask-cors/releases/tag/3.0.9"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4775"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00028.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00032.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00039.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/corydolphin/flask-cors","events":[{"introduced":"0"},{"fixed":"91babb941e07a1f45636bdcb75675f13ce1503a2"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.0.9"}]}}],"versions":["1.10.0","1.10.1","1.10.2","1.10.3","1.8.1","1.9.0","2.0.0","2.0.0rc1","2.0.1","2.1.0","2.1.1","2.1.2","2.1.3","3.0.0","3.0.1","3.0.2","3.0.3","3.0.4","3.0.5","3.0.6","3.0.7","3.0.8","v1.1","v1.1.1","v1.1.2","v1.1.3","v1.2.0","v1.2.1","v1.3.0","v1.3.1","v1.4.0","v1.6.0","v1.6.1","v1.7.0","v1.7.2","v1.7.3","v1.7.4","v1.8.0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0-sp1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0-sp2"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.2"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-25032.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}