Source: python-multipart
Version: 0.0.20-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for python-multipart.

CVE-2026-24486[0]:
| Python-Multipart is a streaming multipart parser for Python. Prior
| to version 0.0.22, a Path Traversal vulnerability exists when using
| non-default configuration options `UPLOAD_DIR` and
| `UPLOAD_KEEP_FILENAME=True`. An attacker can write uploaded files to
| arbitrary locations on the filesystem by crafting a malicious
| filename. Users should upgrade to version 0.0.22 to receive a patch
| or, as a workaround, avoid using `UPLOAD_KEEP_FILENAME=True` in
| project configurations.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-24486
    https://www.cve.org/CVERecord?id=CVE-2026-24486
[1] 
https://github.com/Kludex/python-multipart/security/advisories/GHSA-wp53-j4wj-2cfg
[2] 
https://github.com/Kludex/python-multipart/commit/9433f4bbc9652bdde82bbe380984e32f8cfc89c4

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to