Description
Unfurl through 2025.08 contains an improper input validation vulnerability in config parsing that enables Flask debug mode by default. The debug configuration value is read as a string and passed directly to app.run(), causing any non-empty string to evaluate truthy, allowing attackers to access the Werkzeug debugger and disclose sensitive information or achieve remote code execution.
Problem types
Product status
Any version
Credits
Mobasi Security Team
References
github.com/...unfurl/security/advisories/GHSA-vg9h-jx4v-cwx2
github.com/...unfurl/security/advisories/GHSA-vg9h-jx4v-cwx2 (GHSA Advisory GHSA-vg9h-jx4v-cwx2)
www.vulncheck.com/...gger-exposure-via-string-config-parsing (VulnCheck Advisory: dfir-unfurl - Werkzeug Debugger Exposure via String Config Parsing)