Werkzeug is a comprehensive WSGI web application library. Browsers may allow "nameless" cookies that look like `=value` instead of `key=value`. A vulnerable browser may allow a compromised application on an adjacent subdomain to exploit this to set a cookie like `=__Host-test=bad` for another subdomain. Werkzeug prior to 2.2.3 will parse the cookie `=__Host-test=bad` as __Host-test=bad`. If a Werkzeug application is running next to a vulnerable or malicious subdomain which sets such a cookie using a vulnerable browser, the Werkzeug application will see the bad cookie value but the valid cookie key. The issue is fixed in Werkzeug 2.2.3.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3346-1 python-werkzeug security update
Debian DSA Debian DSA DSA-5470-1 python-werkzeug security update
EUVD EUVD EUVD-2023-0281 Werkzeug is a comprehensive WSGI web application library. Browsers may allow "nameless" cookies that look like `=value` instead of `key=value`. A vulnerable browser may allow a compromised application on an adjacent subdomain to exploit this to set a cookie like `=__Host-test=bad` for another subdomain. Werkzeug prior to 2.2.3 will parse the cookie `=__Host-test=bad` as __Host-test=bad`. If a Werkzeug application is running next to a vulnerable or malicious subdomain which sets such a cookie using a vulnerable browser, the Werkzeug application will see the bad cookie value but the valid cookie key. The issue is fixed in Werkzeug 2.2.3.
Github GHSA Github GHSA GHSA-px8h-6qxv-m22q Incorrect parsing of nameless cookies leads to __Host- cookies bypass
Ubuntu USN Ubuntu USN USN-5948-1 Werkzeug vulnerabilities
Ubuntu USN Ubuntu USN USN-5948-2 Werkzeug vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 27 Jun 2025 02:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:ceph_storage:8.1::el9

Thu, 08 May 2025 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat ceph Storage
CPEs cpe:/a:redhat:ceph_storage:7.1::el8
Vendors & Products Redhat ceph Storage

Mon, 10 Mar 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-03-10T21:11:36.910Z

Reserved: 2023-01-19T21:12:31.360Z

Link: CVE-2023-23934

cve-icon Vulnrichment

Updated: 2024-08-02T10:49:07.628Z

cve-icon NVD

Status : Modified

Published: 2023-02-14T20:15:17.370

Modified: 2024-11-21T07:47:07.947

Link: CVE-2023-23934

cve-icon Redhat

Severity : Low

Publid Date: 2023-02-14T00:00:00Z

Links: CVE-2023-23934 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses