Description
Flask-HTTPAuth provides Basic, Digest and Token HTTP authentication for Flask routes. Prior to version 4.8.1, in a situation where the client makes a request to a token protected resource without passing a token, or passing an empty token, Flask-HTTPAuth would invoke the application's token verification callback function with the token argument set to an empty string. If the application had any users in its database with an empty string set as their token, then it could potentially authenticate the client request against any of those users. This issue has been patched in version 4.8.1.
Published: 2026-04-01
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authentication bypass
Action: Patch Immediately
AI Analysis

Impact

Flask-HTTPAuth incorrectly invokes the token verification callback when a request omits a token or supplies an empty string. The callback receives the empty token value, and if the application database contains a user whose token is an empty string, the attacker can be authenticated as that user. This flaw is an authentication failure (CWE‑287) that can allow unauthorized access to protected resources, compromising confidentiality and integrity of the application.

Affected Systems

All installations of the miguelgrinberg:Flask-HTTPAuth package prior to version 4.8.1 are affected. Applications that use this library for Basic, Digest, or Token HTTP authentication and deploy older releases are vulnerable.

Risk and Exploitability

The CVSS score of 6.5 indicates medium severity. The EPSS score is less than 1%, indicating a very low exploitation probability, and the vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw remotely by sending an unauthenticated HTTP request to a token‑protected endpoint. No privileged local access is required, but the ability to authenticate as any user with an empty token presents a significant risk.

Generated by OpenCVE AI on April 17, 2026 at 09:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Flask-HTTPAuth to version 4.8.1 or later
  • Verify that no user records contain an empty token in the database
  • Review and test the token verification logic to ensure it rejects empty tokens and handles missing tokens safely

Generated by OpenCVE AI on April 17, 2026 at 09:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-p44q-vqpr-4xmg Flask-HTTPAuth invokes token verification callback when missing or empty token was given by client
History

Thu, 16 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:miguelgrinberg:flask-httpauth:*:*:*:*:*:python:*:*

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Miguelgrinberg
Miguelgrinberg flask-httpauth
Vendors & Products Miguelgrinberg
Miguelgrinberg flask-httpauth

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Flask-HTTPAuth provides Basic, Digest and Token HTTP authentication for Flask routes. Prior to version 4.8.1, in a situation where the client makes a request to a token protected resource without passing a token, or passing an empty token, Flask-HTTPAuth would invoke the application's token verification callback function with the token argument set to an empty string. If the application had any users in its database with an empty string set as their token, then it could potentially authenticate the client request against any of those users. This issue has been patched in version 4.8.1.
Title Flask-HTTPAuth invokes token verification callback when missing or empty token was given by client
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N'}


Subscriptions

Miguelgrinberg Flask-httpauth
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-02T16:24:04.160Z

Reserved: 2026-03-30T16:03:31.048Z

Link: CVE-2026-34531

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T21:17:01.147

Modified: 2026-04-16T16:21:05.147

Link: CVE-2026-34531

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T10:00:03Z

Weaknesses