{"id":"CVE-2024-6844","summary":"Inconsistent CORS Matching Due to Handling of '+' in URL Path in corydolphin/flask-cors","details":"A vulnerability in corydolphin/flask-cors version 4.0.1 allows for inconsistent CORS matching due to the handling of the '+' character in URL paths. The request.path is passed through the unquote_plus function, which converts the '+' character to a space ' '. This behavior leads to incorrect path normalization, causing potential mismatches in CORS configuration. As a result, endpoints may not be matched correctly to their CORS settings, leading to unexpected CORS policy application. This can cause unauthorized cross-origin access or block valid requests, creating security vulnerabilities and usability issues.","aliases":["GHSA-8vgw-p6qm-5gr7"],"modified":"2026-05-18T05:59:06.570208146Z","published":"2025-03-20T10:10:51.818Z","related":["CGA-q8vf-4j25-857w","openSUSE-SU-2026:10485-1"],"database_specific":{"cwe_ids":["CWE-346"],"cna_assigner":"@huntr_ai","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/6xxx/CVE-2024-6844.json"},"references":[{"type":"WEB","url":"https://huntr.com/bounties/731a6cd4-d05f-4fe6-8f5b-fe088d7b34e0"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00049.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/6xxx/CVE-2024-6844.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6844"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/corydolphin/flask-cors","events":[{"introduced":"0"},{"last_affected":"1df178ccc019c5aa7282246288c04f867d716790"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"4.0.1"}],"cpe":"cpe:2.3:a:flask-cors_project:flask-cors:4.0.1:*:*:*:*:*:*:*"}}],"versions":["4.0.1","4.0.0","3.1.01","3.0.10","3.0.9","3.0.8","3.0.7","3.0.6","3.0.5","3.0.4","3.0.3","3.0.2","3.0.1","3.0.0","2.1.3","2.1.2","2.1.1","2.1.0","2.0.1","2.0.0","2.0.0rc1","1.10.3","1.10.2","1.10.1","1.10.0","1.9.0","1.8.1","v1.8.0","v1.7.4","v1.7.3","v1.7.2","v1.7.0","v1.6.1","v1.6.0","v1.4.0","v1.3.1","v1.3.0","v1.2.1","v1.2.0","v1.1.3","v1.1.2","v1.1.1","v1.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-6844.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}]}