๐Ÿ” CVE Alert

CVE-2026-44307

UNKNOWN 0.0

Mako: Path traversal via backslash URI on Windows in TemplateLookup

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Mako is a template library written in Python. Prior to 1.3.12, on Windows, a URI using backslash traversal (e.g. \..\..\ secret.txt) bypasses the directory traversal check in Template.__init__ and the posixpath-based normalization in TemplateLookup.get_template(), allowing reads of files outside the configured template directory. This vulnerability is fixed in 1.3.12.

CWE CWE-22
Vendor sqlalchemy
Product mako
Published May 12, 2026
Last Updated May 13, 2026
Stay Ahead of the Next One

Get instant alerts for sqlalchemy mako

Be the first to know when new unknown vulnerabilities affecting sqlalchemy mako are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

sqlalchemy / mako
< 1.3.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/sqlalchemy/mako/security/advisories/GHSA-2h4p-vjrc-8xpq github.com: https://github.com/sqlalchemy/mako/issues/435 github.com: https://github.com/sqlalchemy/mako/commit/72e10c573ca0fbcbddd4455abca8ce92a61780d7 github.com: https://github.com/sqlalchemy/mako/releases/tag/rel_1_3_12