{"id":"CVE-2024-6866","summary":"Case-Insensitive Path Matching in corydolphin/flask-cors","details":"corydolphin/flask-cors version 4.01 contains a vulnerability where the request path matching is case-insensitive due to the use of the `try_match` function, which is originally intended for matching hosts. This results in a mismatch because paths in URLs are case-sensitive, but the regex matching treats them as case-insensitive. This misconfiguration can lead to significant security vulnerabilities, allowing unauthorized origins to access paths meant to be restricted, resulting in data exposure and potential data leaks.","aliases":["GHSA-43qf-4rqw-9q2g"],"modified":"2026-05-18T05:59:06.518773784Z","published":"2025-03-20T10:10:59.521Z","related":["CGA-whf4-f4w4-r4wg","openSUSE-SU-2026:10485-1"],"database_specific":{"cna_assigner":"@huntr_ai","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/6xxx/CVE-2024-6866.json","cwe_ids":["CWE-178"]},"references":[{"type":"WEB","url":"https://huntr.com/bounties/808c11af-faee-43a8-824b-b5ab4f62b9e6"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00049.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/6xxx/CVE-2024-6866.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6866"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/corydolphin/flask-cors","events":[{"introduced":"0"},{"last_affected":"1df178ccc019c5aa7282246288c04f867d716790"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"4.0.1"}],"cpe":"cpe:2.3:a:flask-cors_project:flask-cors:4.0.1:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["4.0.1","4.0.0","3.1.01","3.0.10","3.0.9","3.0.8","3.0.7","3.0.6","3.0.5","3.0.4","3.0.3","3.0.2","3.0.1","3.0.0","2.1.3","2.1.2","2.1.1","2.1.0","2.0.1","2.0.0","2.0.0rc1","1.10.3","1.10.2","1.10.1","1.10.0","1.9.0","1.8.1","v1.8.0","v1.7.4","v1.7.3","v1.7.2","v1.7.0","v1.6.1","v1.6.0","v1.4.0","v1.3.1","v1.3.0","v1.2.1","v1.2.0","v1.1.3","v1.1.2","v1.1.1","v1.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-6866.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}]}