CVE-2026-41205
Severity CVSS v4.0:
HIGH
Type:
CWE-22
Path Traversal
Publication date:
23/04/2026
Last modified:
28/04/2026
Description
Mako is a template library written in Python. Prior to 1.3.11, TemplateLookup.get_template() is vulnerable to path traversal when a URI starts with // (e.g., //../../../secret.txt). The root cause is an inconsistency between two slash-stripping implementations. Any file readable by the process can be returned as rendered template content when an application passes untrusted input directly to TemplateLookup.get_template(). This vulnerability is fixed in 1.3.11.
Impact
Base Score 4.0
7.70
Severity 4.0
HIGH
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:sqlalchemy:mako:*:*:*:*:*:*:*:* | 1.3.11 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



