Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. Flask-HTTPAuth
  4. ›
  5. CVE-2026-34531

CVE-2026-34531: Flask-HTTPAuth invokes token verification callback when missing or empty token was given by client

March 31, 2026 (updated April 6, 2026)

In a situation where the client makes a request to a token protected resource without passing a token, or passing an empty token, Flask-HTTPAuth would invoke the application’s token verification callback function with the token argument set to an empty string. If the application had any users in its database with an empty string set as their token, then it could potentially authenticate the client request against any of those users.

References

  • github.com/advisories/GHSA-p44q-vqpr-4xmg
  • github.com/miguelgrinberg/Flask-HTTPAuth
  • github.com/miguelgrinberg/Flask-HTTPAuth/releases/tag/v4.8.1
  • github.com/miguelgrinberg/Flask-HTTPAuth/security/advisories/GHSA-p44q-vqpr-4xmg
  • github.com/miguelgrinberg/flask-httpauth/commit/b15ffe9e50e110d7174ccd944f642079e1dcf9ee
  • nvd.nist.gov/vuln/detail/CVE-2026-34531

Code Behaviors & Features

Detect and mitigate CVE-2026-34531 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 4.8.1

Fixed versions

  • 4.8.1

Solution

Upgrade to version 4.8.1 or above.

Impact 6.5 MEDIUM

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-287: Improper Authentication

Source file

pypi/Flask-HTTPAuth/CVE-2026-34531.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:43 +0000.