CKAN is an open-source DMS (data management system) for powering data hubs and data portals. Prior to 2.10.10 and 2.11.5, Access to the views via tokens or unauthenticated requests marked the endpoint as not requiring CSRF protection. The marking was a member variable in flask-wtf.csrf.CSRFProtect(), which was stored as a module level variable in the flask_app middleware. This API was never intended for request level changes, it is primarily a decorator for static configuration. An unauthenticated request could hit a protected endpoint, exempting it from CSRF protection for the life of the particular server process. (e.g. one worker of uwsgi). This vulnerability is fixed in 2.10.10 and 2.11.5.
Metrics
Affected Vendors & Products
References
History
Thu, 14 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ckan
Ckan ckan |
|
| Vendors & Products |
Ckan
Ckan ckan |
Wed, 13 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CKAN is an open-source DMS (data management system) for powering data hubs and data portals. Prior to 2.10.10 and 2.11.5, Access to the views via tokens or unauthenticated requests marked the endpoint as not requiring CSRF protection. The marking was a member variable in flask-wtf.csrf.CSRFProtect(), which was stored as a module level variable in the flask_app middleware. This API was never intended for request level changes, it is primarily a decorator for static configuration. An unauthenticated request could hit a protected endpoint, exempting it from CSRF protection for the life of the particular server process. (e.g. one worker of uwsgi). This vulnerability is fixed in 2.10.10 and 2.11.5. | |
| Title | CKAN: CSRF exemption primed by anonymous requests | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-05-13T18:57:41.256Z
Updated: 2026-05-14T12:44:14.133Z
Reserved: 2026-04-18T14:01:46.800Z
Link: CVE-2026-41255
Updated: 2026-05-14T12:44:02.090Z
Status : Awaiting Analysis
Published: 2026-05-13T19:17:22.127
Modified: 2026-05-14T16:26:50.047
Link: CVE-2026-41255
No data.