CVE-2026-44307: Mako vulnerable to path traversal via backslash URI on Windows in TemplateLookup
On Windows, a URI using backslash traversal (e.g. \..\..\ secret.txt) bypasses the directory traversal check in Template.__init__ and the posixpath-based normalization in TemplateLookup.get_template(), allowing reads of files outside the configured template directory.
References
- github.com/advisories/GHSA-2h4p-vjrc-8xpq
- github.com/sqlalchemy/mako
- github.com/sqlalchemy/mako/commit/72e10c573ca0fbcbddd4455abca8ce92a61780d7
- github.com/sqlalchemy/mako/issues/435
- github.com/sqlalchemy/mako/releases/tag/rel_1_3_12
- github.com/sqlalchemy/mako/security/advisories/GHSA-2h4p-vjrc-8xpq
- nvd.nist.gov/vuln/detail/CVE-2026-44307
Code Behaviors & Features
Detect and mitigate CVE-2026-44307 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →