{"id":"CVE-2024-6866","details":"corydolphin/flask-cors version 4.01 contains a vulnerability where the request path matching is case-insensitive due to the use of the `try_match` function, which is originally intended for matching hosts. This results in a mismatch because paths in URLs are case-sensitive, but the regex matching treats them as case-insensitive. This misconfiguration can lead to significant security vulnerabilities, allowing unauthorized origins to access paths meant to be restricted, resulting in data exposure and potential data leaks.","aliases":["GHSA-43qf-4rqw-9q2g"],"modified":"2026-04-04T07:44:21.223874481Z","published":"2025-03-20T10:15:34.620Z","related":["CGA-whf4-f4w4-r4wg","MGASA-2025-0286","openSUSE-SU-2026:10485-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00049.html"},{"type":"EVIDENCE","url":"https://huntr.com/bounties/808c11af-faee-43a8-824b-b5ab4f62b9e6"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/corydolphin/flask-cors","events":[{"introduced":"0"},{"last_affected":"1df178ccc019c5aa7282246288c04f867d716790"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.0.1"}]}}],"versions":["1.10.0","1.10.1","1.10.2","1.10.3","1.8.1","1.9.0","2.0.0","2.0.0rc1","2.0.1","2.1.0","2.1.1","2.1.2","2.1.3","3.0.0","3.0.1","3.0.10","3.0.2","3.0.3","3.0.4","3.0.5","3.0.6","3.0.7","3.0.8","3.0.9","3.1.01","4.0.0","4.0.1","v1.1","v1.1.1","v1.1.2","v1.1.3","v1.2.0","v1.2.1","v1.3.0","v1.3.1","v1.4.0","v1.6.0","v1.6.1","v1.7.0","v1.7.2","v1.7.3","v1.7.4","v1.8.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-6866.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}