Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. Flask
  4. ›
  5. CVE-2025-47278

CVE-2025-47278: Flask uses fallback key instead of current signing key

May 13, 2025

In Flask 3.1.0, the way fallback key configuration was handled resulted in the last fallback key being used for signing, rather than the current signing key.

Signing is provided by the itsdangerous library. A list of keys can be passed, and it expects the last (top) key in the list to be the most recent key, and uses that for signing. Flask was incorrectly constructing that list in reverse, passing the signing key first.

Sites that have opted-in to use key rotation by setting SECRET_KEY_FALLBACKS are likely to unexpectedly be signing their sessions with stale keys, and their transition to fresher keys will be impeded. Sessions are still signed, so this would not cause any sort of data integrity loss.

References

  • github.com/advisories/GHSA-4grg-w6v8-c28g
  • github.com/pallets/flask
  • github.com/pallets/flask/commit/73d6504063bfa00666a92b07a28aaf906c532f09
  • github.com/pallets/flask/releases/tag/3.1.1
  • github.com/pallets/flask/security/advisories/GHSA-4grg-w6v8-c28g
  • nvd.nist.gov/vuln/detail/CVE-2025-47278

Code Behaviors & Features

Detect and mitigate CVE-2025-47278 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 3.1.0 before 3.1.1, version 3.1.0

Fixed versions

  • 3.1.1

Solution

Upgrade to version 3.1.1 or above.

Weakness

  • CWE-683: Function Call With Incorrect Order of Arguments

Source file

pypi/Flask/CVE-2025-47278.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:08 +0000.