Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. ckan
  4. ›
  5. CVE-2026-41255

CVE-2026-41255: CKAN has CSRF exemption primed by anonymous requests

April 29, 2026 (updated May 8, 2026)

Views can be marked as exempt from CSRF protection

Access to the views via tokens or unauthenticated requests marked the endpoint as not requiring CSRF protection.

The marking was a member variable in flask-wtf.csrf.CSRFProtect(), which was stored as a module level variable in the flask_app middleware. Thsi API was never intended for request level changes, it is primarily a decorator for static configuration.

An unauthenticated request could hit a protected endpoint, exempting it from CSRF protection for the life of the particular server process. (e.g. one worker of uwsgi).

This could be leveraged with XSS to perform actions using other user’s credentials.

References

  • docs.ckan.org/en/2.10/changelog.html
  • docs.ckan.org/en/2.11/changelog.html
  • github.com/advisories/GHSA-mcvf-jxcw-vj73
  • github.com/ckan/ckan
  • github.com/ckan/ckan/security/advisories/GHSA-mcvf-jxcw-vj73
  • nvd.nist.gov/vuln/detail/CVE-2026-41255

Code Behaviors & Features

Detect and mitigate CVE-2026-41255 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.10.0 before 2.10.10, all versions starting from 2.11.0 before 2.11.5

Fixed versions

  • 2.10.10
  • 2.11.5

Solution

Upgrade to versions 2.10.10, 2.11.5 or above.

Impact 6.1 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-352: Cross-Site Request Forgery (CSRF)

Source file

pypi/ckan/CVE-2026-41255.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:20:24 +0000.