๐Ÿ” CVE Alert

CVE-2026-41205

UNKNOWN 0.0

Mako: Path traversal via double-slash URI prefix in TemplateLookup

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Mako is a template library written in Python. Prior to 1.3.11, TemplateLookup.get_template() is vulnerable to path traversal when a URI starts with // (e.g., //../../../secret.txt). The root cause is an inconsistency between two slash-stripping implementations. Any file readable by the process can be returned as rendered template content when an application passes untrusted input directly to TemplateLookup.get_template(). This vulnerability is fixed in 1.3.11.

CWE CWE-22
Vendor sqlalchemy
Product mako
Published Apr 23, 2026
Last Updated Apr 23, 2026
Stay Ahead of the Next One

Get instant alerts for sqlalchemy mako

Be the first to know when new unknown vulnerabilities affecting sqlalchemy mako are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

sqlalchemy / mako
< 1.3.11

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/sqlalchemy/mako/security/advisories/GHSA-v92g-xgxw-vvmm