Description
Werkzeug is a comprehensive WSGI web application library. Browsers may allow "nameless" cookies that look like `=value` instead of `key=value`. A vulnerable browser may allow a compromised application on an adjacent subdomain to exploit this to set a cookie like `=__Host-test=bad` for another subdomain. Werkzeug prior to 2.2.3 will parse the cookie `=__Host-test=bad` as __Host-test=bad`. If a Werkzeug application is running next to a vulnerable or malicious subdomain which sets such a cookie using a vulnerable browser, the Werkzeug application will see the bad cookie value but the valid cookie key. The issue is fixed in Werkzeug 2.2.3.
Published: 2023-02-14
Score: 2.6 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3346-1 python-werkzeug security update
Debian DSA Debian DSA DSA-5470-1 python-werkzeug security update
EUVD EUVD EUVD-2023-0281 Werkzeug is a comprehensive WSGI web application library. Browsers may allow "nameless" cookies that look like `=value` instead of `key=value`. A vulnerable browser may allow a compromised application on an adjacent subdomain to exploit this to set a cookie like `=__Host-test=bad` for another subdomain. Werkzeug prior to 2.2.3 will parse the cookie `=__Host-test=bad` as __Host-test=bad`. If a Werkzeug application is running next to a vulnerable or malicious subdomain which sets such a cookie using a vulnerable browser, the Werkzeug application will see the bad cookie value but the valid cookie key. The issue is fixed in Werkzeug 2.2.3.
Github GHSA Github GHSA GHSA-px8h-6qxv-m22q Incorrect parsing of nameless cookies leads to __Host- cookies bypass
Ubuntu USN Ubuntu USN USN-5948-1 Werkzeug vulnerabilities
Ubuntu USN Ubuntu USN USN-5948-2 Werkzeug vulnerabilities
History

Fri, 27 Jun 2025 02:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:ceph_storage:8.1::el9

Thu, 08 May 2025 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat ceph Storage
CPEs cpe:/a:redhat:ceph_storage:7.1::el8
Vendors & Products Redhat ceph Storage

Mon, 10 Mar 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Palletsprojects Werkzeug
Redhat Ceph Storage Openstack
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-03-10T21:11:36.910Z

Reserved: 2023-01-19T21:12:31.360Z

Link: CVE-2023-23934

cve-icon Vulnrichment

Updated: 2024-08-02T10:49:07.628Z

cve-icon NVD

Status : Modified

Published: 2023-02-14T20:15:17.370

Modified: 2024-11-21T07:47:07.947

Link: CVE-2023-23934

cve-icon Redhat

Severity : Low

Publid Date: 2023-02-14T00:00:00Z

Links: CVE-2023-23934 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses