Generated remediation guidance and an executive summary. No account required.
Werkzeug is a comprehensive WSGI web application library. Prior to version 3.1.4, Werkzeug's safe_join function allows path segments with Windows device names. On Windows, there are special device names such as CON, AUX, etc that are implicitly present and readable in every directory. send_from_directory uses safe_join to safely serve files at user-specified paths under a directory. If the application is running on Windows, and the requested path ends with a special device name, the file will be opened successfully, but reading will hang indefinitely. This issue has been patched in version 3.1.4.
Cite this page
CVE-2025-66221. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2025-66221
Use CWE-67, Palletsprojects vendor hub and Werkzeug product page to widen CVE-2025-66221 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2022-29361, CVE-2023-46136 and CVE-2024-34069 for nearby disclosures in the same product family.