Metrics
Affected Vendors & Products
Thu, 09 Apr 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dfir-unfurl
Dfir-unfurl dfir-unfurl |
|
| Vendors & Products |
Dfir-unfurl
Dfir-unfurl dfir-unfurl |
Wed, 08 Apr 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | dfir-unfurl through 20250810 contains an improper input validation vulnerability in config parsing that enables Flask debug mode by default. The debug configuration value is read as a string and passed directly to app.run(), causing any non-empty string to evaluate truthy, allowing attackers to access the Werkzeug debugger and disclose sensitive information or achieve remote code execution. | Unfurl through 2025.08 contains an improper input validation vulnerability in config parsing that enables Flask debug mode by default. The debug configuration value is read as a string and passed directly to app.run(), causing any non-empty string to evaluate truthy, allowing attackers to access the Werkzeug debugger and disclose sensitive information or achieve remote code execution. |
| Title | dfir-unfurl - Werkzeug Debugger Exposure via String Config Parsing | Unfurl - Werkzeug Debugger Exposure via String Config Parsing |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 08 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | dfir-unfurl through 20250810 contains an improper input validation vulnerability in config parsing that enables Flask debug mode by default. The debug configuration value is read as a string and passed directly to app.run(), causing any non-empty string to evaluate truthy, allowing attackers to access the Werkzeug debugger and disclose sensitive information or achieve remote code execution. | |
| Title | dfir-unfurl - Werkzeug Debugger Exposure via String Config Parsing | |
| Weaknesses | CWE-489 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-08T21:43:41.987Z
Reserved: 2026-04-08T13:36:58.277Z
Link: CVE-2026-40035
No data.
Status : Received
Published: 2026-04-08T22:16:24.010
Modified: 2026-04-08T22:16:24.010
Link: CVE-2026-40035
No data.
OpenCVE Enrichment
Updated: 2026-04-09T08:25:49Z