Vulnerability Details CVE-2020-7965
flaskparser.py in Webargs 5.x through 5.5.2 doesn't check that the Content-Type header is application/json when receiving JSON input. If the request body is valid JSON, it will accept it even if the content type is application/x-www-form-urlencoded. This allows for JSON POST requests to be made across domains, leading to CSRF.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 38.5%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 6.8
Products affected by CVE-2020-7965
-
cpe:2.3:a:webargs_project:webargs:5.0.0
-
cpe:2.3:a:webargs_project:webargs:5.1.0
-
cpe:2.3:a:webargs_project:webargs:5.1.1
-
cpe:2.3:a:webargs_project:webargs:5.1.2
-
cpe:2.3:a:webargs_project:webargs:5.1.3
-
cpe:2.3:a:webargs_project:webargs:5.2.0
-
cpe:2.3:a:webargs_project:webargs:5.3.0
-
cpe:2.3:a:webargs_project:webargs:5.3.1
-
cpe:2.3:a:webargs_project:webargs:5.3.2
-
cpe:2.3:a:webargs_project:webargs:5.4.0
-
cpe:2.3:a:webargs_project:webargs:5.5.0
-
cpe:2.3:a:webargs_project:webargs:5.5.1
-
cpe:2.3:a:webargs_project:webargs:5.5.2