CVE-2026-24486
Summary
A Path Traversal vulnerability exists when using non-default configuration options UPLOAD_DIR and UPLOADKEEPFILENAME=True. An attacker can write uploaded files to arbitrary locations on the filesystem by crafting a malicious filename.
Details
When UPLOAD_DIR is set and UPLOADKEEPFILENAME is True, the library constructs the file path using os.path.join(file_dir, fname). Due to the behavior of os.path.join(), if the filename begins with a /, all preceding path components are discarded:
os.path.join("/upload/dir", "/etc/malicious") == "/etc/malicious"
This allows an attacker to bypass the intended upload directory and write files to arbitrary paths.
Affected Configuration
Projects are only affected if all of the following are true:
UPLOAD_DIRis setUPLOADKEEPFILENAMEis set to True- The uploaded file exceeds
MAXMEMORYFILE_SIZE(triggering a flush to disk)
The default configuration is not vulnerable.
Impact
Arbitrary file write to attacker-controlled paths on the filesystem.
Mitigation
Upgrade to version 0.0.22, or avoid using UPLOADKEEPFILENAME=True in project configurations.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/Kludex/python-multipart/security/advisories/GHSA-wp53-j4wj-2cfg, https://nvd.nist.gov/vuln/detail/CVE-2026-24486, https://github.com/Kludex/python-multipart/commit/9433f4bbc9652bdde82bbe380984e32f8cfc89c4, https://github.com/Kludex/python-multipart, https://github.com/Kludex/python-multipart/releases/tag/0.0.22
