Skip to content

chore(deps): [migrate-from-aws-to-google-cloud] Update dependency flask to v3.1.3 [SECURITY] - autoclosed#345

Closed
renovate-bot wants to merge 1 commit intoGoogleCloudPlatform:mainfrom
renovate-bot:renovate/pypi-flask-vulnerability
Closed

chore(deps): [migrate-from-aws-to-google-cloud] Update dependency flask to v3.1.3 [SECURITY] - autoclosed#345
renovate-bot wants to merge 1 commit intoGoogleCloudPlatform:mainfrom
renovate-bot:renovate/pypi-flask-vulnerability

Conversation

@renovate-bot
Copy link
Copy Markdown
Contributor

@renovate-bot renovate-bot commented Feb 20, 2026

This PR contains the following updates:

Package Change Age Confidence
flask (changelog) ==3.1.2==3.1.3 age confidence

GitHub Vulnerability Alerts

CVE-2026-27205

When the session object is accessed, Flask should set the Vary: Cookie header. This instructs caches not to cache the response, as it may contain information specific to a logged in user. This is handled in most cases, but some forms of access such as the Python in operator were overlooked.

The severity depends on the application's use of the session, and the cache's behavior regarding cookies. The risk depends on all these conditions being met.

  1. The application must be hosted behind a caching proxy that does not ignore responses with cookies.
  2. The application does not set a Cache-Control header to indicate that a page is private or should not be cached.
  3. The application accesses the session in a way that does not access the values, only the keys, and does not mutate the session.

Flask session does not add Vary: Cookie header when accessed in some ways

CVE-2026-27205 / GHSA-68rp-wp8r-4726

More information

Details

When the session object is accessed, Flask should set the Vary: Cookie header. This instructs caches not to cache the response, as it may contain information specific to a logged in user. This is handled in most cases, but some forms of access such as the Python in operator were overlooked.

The severity depends on the application's use of the session, and the cache's behavior regarding cookies. The risk depends on all these conditions being met.

  1. The application must be hosted behind a caching proxy that does not ignore responses with cookies.
  2. The application does not set a Cache-Control header to indicate that a page is private or should not be cached.
  3. The application accesses the session in a way that does not access the values, only the keys, and does not mutate the session.

Severity

  • CVSS Score: 2.3 / 10 (Low)
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Release Notes

pallets/flask (flask)

v3.1.3

Compare Source

Released 2026-02-18

  • The session is marked as accessed for operations that only access the keys
    but not the values, such as in and len. :ghsa:68rp-wp8r-4726

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@forking-renovate forking-renovate Bot added dependencies Pull requests that update a dependency file p0 labels Feb 20, 2026
@renovate-bot renovate-bot added dependencies Pull requests that update a dependency file SECURITY p0 labels Feb 20, 2026
@renovate-bot renovate-bot changed the title chore(deps): [conversational-commerce-agent] Update dependency flask to v3.1.3 [SECURITY] chore(deps): [migrate-from-aws-to-google-cloud] Update dependency flask to v3.1.3 [SECURITY] Mar 3, 2026
@renovate-bot renovate-bot force-pushed the renovate/pypi-flask-vulnerability branch from dd916d4 to ce96e52 Compare March 3, 2026 13:47
copybara-service Bot pushed a commit that referenced this pull request Mar 4, 2026
…sk to v3.1.3 [SECURITY]

Import of github PR #345 from renovate-bot
#345

This PR contains the following updates:

[flask](https://redirect.github.com/pallets/flask): `==3.1.2` → `==3.1.3`

### GitHub Vulnerability Alerts

#### [CVE-2026-27205](https://redirect.github.com/pallets/flask/security/advisories/GHSA-68rp-wp8r-4726)

When the `session` object is accessed, Flask should set the `Vary: Cookie` header. This instructs caches not to cache the response, as it may contain information specific to a logged in user. This is handled in most cases, but some forms of access such as the Python `in` operator were overlooked.

The severity depends on the application's use of the session, and the cache's behavior regarding cookies. The risk depends on all these conditions being met.

1. The application must be hosted behind a caching proxy that does not ignore responses with cookies.
2. The application does not set a `Cache-Control` header to indicate that a page is private or should not be cached.
3. The application accesses the session in a way that does not access the values, only the keys, and does not mutate the session.

---

### Flask session does not add `Vary: Cookie` header when accessed in some ways
[CVE-2026-27205](https://nvd.nist.gov/vuln/detail/CVE-2026-27205) / [GHSA-68rp-wp8r-4726](https://redirect.github.com/advisories/GHSA-68rp-wp8r-4726)

---

### Release Notes

---

### Commit Message(s):

--
Change 1 of 1 by Mend Renovate <bot@renovateapp.com>:

chore(deps): [migrate-from-aws-to-google-cloud] Update dependency flask to v3.1.3 [SECURITY]

GitOrigin-RevId: 55ea70df13da979a0b12bf84487b8abe1a5b8c2f
Change-Id: Ic9ca02a05bb7aaefe31478374209cb237102d794
@renovate-bot renovate-bot changed the title chore(deps): [migrate-from-aws-to-google-cloud] Update dependency flask to v3.1.3 [SECURITY] chore(deps): [migrate-from-aws-to-google-cloud] Update dependency flask to v3.1.3 [SECURITY] - autoclosed Mar 4, 2026
@renovate-bot renovate-bot deleted the renovate/pypi-flask-vulnerability branch March 4, 2026 15:38
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file p0 SECURITY

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants