Loading
Unfurl through 2025.08 contains an improper input validation vulnerability in config parsing that enables Flask debug mode by default. The debug configuration value is read as a string and passed directly to app.run(), causing any non-empty string to evaluate truthy, allowing attackers to access the Werkzeug debugger and disclose sensitive information or achieve remote code execution.
Use CWE-489, Ryandfir vendor hub and Unfurl product page to widen CVE-2026-40035 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-40036 for nearby disclosures in the same product family.