<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Vulnerability Spoiler Alert - pallets/flask</title>
    <link>https://spaceraccoon.github.io/vulnerability-spoiler-alert</link>
    <description>Vulnerability alerts for pallets/flask</description>
    <language>en-us</language>
    <lastBuildDate>Fri, 17 Apr 2026 01:52:35 GMT</lastBuildDate>
    <atom:link href="https://spaceraccoon.github.io/vulnerability-spoiler-alert/feed/pallets-flask.xml" rel="self" type="application/rss+xml"/>
    <item>
      <title>[MEDIUM] HTTP Response Splitting / Cache Poisoning in pallets/flask</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/39</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/39</guid>
      <pubDate>Thu, 19 Feb 2026 17:05:30 GMT</pubDate>
      <description>The session was not properly marked as accessed when only reading session metadata (keys, length checks), allowing responses to be cached without the Vary: Cookie header. This could lead to cache poisoning where one user&apos;s cached response is served to another user, potentially exposing session-dependent data.</description>
      <category>medium</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[MEDIUM] Information Disclosure in pallets/flask</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/38</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/38</guid>
      <pubDate>Thu, 19 Feb 2026 17:05:19 GMT</pubDate>
      <description>The session was not being marked as accessed when only checking keys/metadata, allowing caching proxies to cache pages for different users. This could lead to session data being served to wrong users through shared caches. The patch fixes this by tracking session access at the request context level.</description>
      <category>medium</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[MEDIUM] Information Disclosure in pallets/flask</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/37</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/37</guid>
      <pubDate>Thu, 19 Feb 2026 17:05:03 GMT</pubDate>
      <description>The session was not being marked as accessed when only reading operations like checking keys or length occurred, causing the &apos;Vary: Cookie&apos; header to not be set. This could allow caching proxies to serve the same cached response to different users, potentially leaking session-dependent data between users.</description>
      <category>medium</category>
      <category>unverified</category>
    </item>
  </channel>
</rss>