Vulnerability Description
Mako is a template library written in Python. Prior to 1.3.11, TemplateLookup.get_template() is vulnerable to path traversal when a URI starts with // (e.g., //../../../secret.txt). The root cause is an inconsistency between two slash-stripping implementations. Any file readable by the process can be returned as rendered template content when an application passes untrusted input directly to TemplateLookup.get_template(). This vulnerability is fixed in 1.3.11.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sqlalchemy | Mako | < 1.3.11 |
Related Weaknesses (CWE)
References
- https://github.com/sqlalchemy/mako/commit/e05ac61989a7fb9dd7dcde6cfd72dc48328719
- https://github.com/sqlalchemy/mako/releases/tag/rel_1_3_11
- https://github.com/sqlalchemy/mako/security/advisories/GHSA-v92g-xgxw-vvmmMitigationVendor Advisory
FAQ
What is CVE-2026-41205?
CVE-2026-41205 is a vulnerability with a CVSS score of 7.5 (HIGH). Mako is a template library written in Python. Prior to 1.3.11, TemplateLookup.get_template() is vulnerable to path traversal when a URI starts with // (e.g., //../../../secret.txt). The root cause is ...
How severe is CVE-2026-41205?
CVE-2026-41205 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-41205?
Check the references section above for vendor advisories and patch information. Affected products include: Sqlalchemy Mako.