Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 08 Apr 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | dfir-unfurl through 20250810 contains an improper input validation vulnerability in config parsing that enables Flask debug mode by default. The debug configuration value is read as a string and passed directly to app.run(), causing any non-empty string to evaluate truthy, allowing attackers to access the Werkzeug debugger and disclose sensitive information or achieve remote code execution. | Unfurl through 2025.08 contains an improper input validation vulnerability in config parsing that enables Flask debug mode by default. The debug configuration value is read as a string and passed directly to app.run(), causing any non-empty string to evaluate truthy, allowing attackers to access the Werkzeug debugger and disclose sensitive information or achieve remote code execution. |
| Title | dfir-unfurl - Werkzeug Debugger Exposure via String Config Parsing | Unfurl - Werkzeug Debugger Exposure via String Config Parsing |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 08 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | dfir-unfurl through 20250810 contains an improper input validation vulnerability in config parsing that enables Flask debug mode by default. The debug configuration value is read as a string and passed directly to app.run(), causing any non-empty string to evaluate truthy, allowing attackers to access the Werkzeug debugger and disclose sensitive information or achieve remote code execution. | |
| Title | dfir-unfurl - Werkzeug Debugger Exposure via String Config Parsing | |
| Weaknesses | CWE-489 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-08T21:43:41.987Z
Reserved: 2026-04-08T13:36:58.277Z
Link: CVE-2026-40035
No data.
Status : Received
Published: 2026-04-08T22:16:24.010
Modified: 2026-04-08T22:16:24.010
Link: CVE-2026-40035
No data.
OpenCVE Enrichment
No data.