Flask-Reuploaded vulnerable to Remote Code Execution via Server-Side Template Injection
Critical severity
GitHub Reviewed
Published
Feb 23, 2026
in
jugmac00/flask-reuploaded
•
Updated Feb 27, 2026
Description
Published by the National Vulnerability Database
Feb 25, 2026
Published to the GitHub Advisory Database
Feb 25, 2026
Reviewed
Feb 25, 2026
Last updated
Feb 27, 2026
Impact
A critical path traversal and extension bypass vulnerability in Flask-Reuploaded allows remote attackers to achieve arbitrary file write and remote code execution through Server-Side Template Injection (SSTI).
Patches
Flask-Reuploaded has been patched in version 1.5.0
Workarounds
nameparameternamemust be usedResources
The fix is documented in the pull request, see jugmac00/flask-reuploaded#180.
A proper write-up was created by the reporter of the vulnerability, Jaron Cabral (https://www.linkedin.com/in/jaron-cabral-751994357/), but is not yet available as of time of this publication.
References