We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-47278

Flask uses fallback key instead of current signing key



Description

Flask is a web server gateway interface (WSGI) web application framework. In Flask 3.1.0, the way fallback key configuration was handled resulted in the last fallback key being used for signing, rather than the current signing key. Signing is provided by the `itsdangerous` library. A list of keys can be passed, and it expects the last (top) key in the list to be the most recent key, and uses that for signing. Flask was incorrectly constructing that list in reverse, passing the signing key first. Sites that have opted-in to use key rotation by setting `SECRET_KEY_FALLBACKS` care likely to unexpectedly be signing their sessions with stale keys, and their transition to fresher keys will be impeded. Sessions are still signed, so this would not cause any sort of data integrity loss. Version 3.1.1 contains a patch for the issue.

Reserved 2025-05-05 | Published 2025-05-13 | Updated 2025-05-13 | Assigner GitHub_M


LOW: 1.8CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-683: Function Call With Incorrect Order of Arguments

Product status

= 3.1.0
affected

References

github.com/.../flask/security/advisories/GHSA-4grg-w6v8-c28g

github.com/...ommit/73d6504063bfa00666a92b07a28aaf906c532f09

github.com/pallets/flask/releases/tag/3.1.1

cve.org (CVE-2025-47278)

nvd.nist.gov (CVE-2025-47278)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-47278

Support options

Helpdesk Chat, Email, Knowledgebase