Flask is a web server gateway interface (WSGI) web application framework. In versions 3.1.2 and below, when the session object is accessed, Flask should set the Vary: Cookie header., resulting in a Use of Cache Containing Sensitive Information vulnerability. The logic instructs caches not to cache the response, as it may contain information specific to a logged in user. This is handled in most cases, but some forms of access such as the Python in operator were overlooked. The severity and risk depend on the application being hosted behind a caching proxy that doesn't ignore responses with cookies, not setting a Cache-Control header to mark pages as private or non-cacheable, and accessing the session in a way that only touches keys without reading values or mutating the session. The issue has been fixed in version 3.1.3.

Project Subscriptions

Vendors Products
Pallets Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-68rp-wp8r-4726 Flask session does not add `Vary: Cookie` header when accessed in some ways
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 24 Feb 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}

threat_severity

Moderate


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Pallets
Pallets flask
Vendors & Products Pallets
Pallets flask

Sat, 21 Feb 2026 05:45:00 +0000

Type Values Removed Values Added
Description Flask is a web server gateway interface (WSGI) web application framework. In versions 3.1.2 and below, when the session object is accessed, Flask should set the Vary: Cookie header., resulting in a Use of Cache Containing Sensitive Information vulnerability. The logic instructs caches not to cache the response, as it may contain information specific to a logged in user. This is handled in most cases, but some forms of access such as the Python in operator were overlooked. The severity and risk depend on the application being hosted behind a caching proxy that doesn't ignore responses with cookies, not setting a Cache-Control header to mark pages as private or non-cacheable, and accessing the session in a way that only touches keys without reading values or mutating the session. The issue has been fixed in version 3.1.3.
Title Flask session does not add `Vary: Cookie` header when accessed in some ways
Weaknesses CWE-524
References
Metrics cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-24T19:03:11.374Z

Reserved: 2026-02-18T19:47:02.155Z

Link: CVE-2026-27205

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-21T06:17:00.910

Modified: 2026-02-23T18:13:53.397

Link: CVE-2026-27205

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-02-21T05:21:17Z

Links: CVE-2026-27205 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-02-23T14:32:41Z

Weaknesses