-
-
Notifications
You must be signed in to change notification settings - Fork 284
chore(deps): update dependency python-multipart to v0.0.22 [security] #7017
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
❌MegaLinter analysis: Error❌ REPOSITORY / trivy - 1 error🤖 AI-Powered Fix Suggestions for REPOSITORY_TRIVY (by openai gpt-4.1-mini)
Example fix for yarn version error: // package.json snippet before
"dependencies": {
"some-package": "version-range@^4.15.0:"
}
// Fix by removing trailing colon
"dependencies": {
"some-package": "^4.15.0"
}Then run
|

This PR contains the following updates:
==0.0.21→==0.0.22GitHub Vulnerability Alerts
CVE-2026-24486
Summary
A Path Traversal vulnerability exists when using non-default configuration options
UPLOAD_DIRandUPLOAD_KEEP_FILENAME=True. An attacker can write uploaded files to arbitrary locations on the filesystem by crafting a malicious filename.Details
When
UPLOAD_DIRis set andUPLOAD_KEEP_FILENAMEisTrue, the library constructs the file path usingos.path.join(file_dir, fname). Due to the behavior ofos.path.join(), if the filename begins with a/, all preceding path components are discarded:This allows an attacker to bypass the intended upload directory and write files to arbitrary paths.
Affected Configuration
Projects are only affected if all of the following are true:
UPLOAD_DIRis setUPLOAD_KEEP_FILENAMEis set to TrueMAX_MEMORY_FILE_SIZE(triggering a flush to disk)The default configuration is not vulnerable.
Impact
Arbitrary file write to attacker-controlled paths on the filesystem.
Mitigation
Upgrade to version 0.0.22, or avoid using
UPLOAD_KEEP_FILENAME=Truein project configurations.Python-Multipart has Arbitrary File Write via Non-Default Configuration
CVE-2026-24486 / GHSA-wp53-j4wj-2cfg
More information
Details
Summary
A Path Traversal vulnerability exists when using non-default configuration options
UPLOAD_DIRandUPLOAD_KEEP_FILENAME=True. An attacker can write uploaded files to arbitrary locations on the filesystem by crafting a malicious filename.Details
When
UPLOAD_DIRis set andUPLOAD_KEEP_FILENAMEisTrue, the library constructs the file path usingos.path.join(file_dir, fname). Due to the behavior ofos.path.join(), if the filename begins with a/, all preceding path components are discarded:This allows an attacker to bypass the intended upload directory and write files to arbitrary paths.
Affected Configuration
Projects are only affected if all of the following are true:
UPLOAD_DIRis setUPLOAD_KEEP_FILENAMEis set to TrueMAX_MEMORY_FILE_SIZE(triggering a flush to disk)The default configuration is not vulnerable.
Impact
Arbitrary file write to attacker-controlled paths on the filesystem.
Mitigation
Upgrade to version 0.0.22, or avoid using
UPLOAD_KEEP_FILENAME=Truein project configurations.Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:LReferences
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Release Notes
Kludex/python-multipart (python-multipart)
v0.0.22Compare Source
File9433f4b.Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.