The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-44307

CVE-2026-44307: Mako Template Path Traversal Vulnerability

CVE-2026-44307 is a path traversal vulnerability in Mako template library for Python that allows attackers on Windows to bypass directory checks and access unauthorized files. This article covers technical details, affected versions, impact, and mitigation.

Published: May 17, 2026

CVE-2026-44307 Overview

CVE-2026-44307 is a path traversal vulnerability [CWE-22] in the Mako template library for Python. On Windows hosts, a URI containing backslash traversal sequences such as \..\..\secret.txt bypasses the directory traversal check in Template.__init__ and the posixpath-based normalization in TemplateLookup.get_template(). The flaw allows attackers to read files outside the configured template directory. The issue affects all Mako versions prior to 1.3.12 and is documented as an incomplete fix for CVE-2026-41205. Maintainers resolved the issue in Mako 1.3.12 by normalizing backslash characters to forward slashes before path resolution.

Critical Impact

Unauthenticated attackers can read arbitrary files outside the template directory on Windows-hosted Mako applications by supplying backslash-based traversal URIs.

Affected Products

  • Mako template library versions prior to 1.3.12
  • Python applications using Mako TemplateLookup on Windows
  • Web frameworks and tooling that expose user-controlled template URIs to Mako

Discovery Timeline

  • 2026-05-12 - CVE-2026-44307 published to NVD
  • 2026-05-13 - Last updated in NVD database

Technical Details for CVE-2026-44307

Vulnerability Analysis

Mako is a server-side template library widely used in Python web applications. The TemplateLookup class resolves template URIs against one or more configured directories. Prior to 1.3.12, the lookup logic stripped leading forward slashes and relied on posixpath-style normalization to detect traversal attempts. On Windows, the operating system treats backslashes as path separators in addition to forward slashes. A URI such as \..\..\secret.txt is not flagged by the posixpath normalizer, but the underlying Windows filesystem honors the backslashes and resolves the path outside the template root. This produces an out-of-tree file read.

Root Cause

The root cause is inconsistent path separator handling between the validation layer and the filesystem layer. The traversal check in Template.__init__ and the normalization performed by TemplateLookup.get_template() only consider posix separators. Windows accepts both / and \, so an attacker-controlled URI with backslashes bypasses validation while still resolving to a real filesystem path.

Attack Vector

The vulnerability is exploitable over the network when an application passes user-supplied input to TemplateLookup.get_template() without sanitizing path separators. No authentication or user interaction is required. Successful exploitation discloses file contents readable by the process running the Mako application, which can include configuration files, credentials, and source code.

python
# Patch in mako/lookup.py (Source: https://github.com/sqlalchemy/mako/commit/72e10c573ca0fbcbddd4455abca8ce92a61780d7)
            else:
                return self._collection[uri]
        except KeyError as e:
-            u = re.sub(r"^\/+", "", uri)
+            u = re.sub(r"^\/+", "", uri.replace("\\", "/"))
            for dir_ in self.directories:
                # make sure the path seperators are posix - os.altsep is empty
                # on POSIX and cannot be used.

The fix replaces backslash characters with forward slashes before stripping leading separators, ensuring the normalization step sees the same path the Windows filesystem will resolve. Reference: GitHub Security Advisory GHSA-2h4p-vjrc-8xpq.

Detection Methods for CVE-2026-44307

Indicators of Compromise

  • HTTP request URIs or template parameters containing backslash sequences such as \..\ or %5C..%5C
  • Mako application logs showing template lookups resolving to paths outside configured directories
  • Web server access logs with URL-encoded backslash bytes (%5C) preceding sensitive filenames
  • Unexpected file reads by the Python process hosting Mako, targeting files such as web.config, .env, or credential stores

Detection Strategies

  • Inventory Python dependencies and flag installations of Mako earlier than 1.3.12 on Windows hosts
  • Inspect application code for direct passing of HTTP parameters into TemplateLookup.get_template() without sanitization
  • Add web application firewall rules that decode and inspect %5C and raw backslash sequences in request paths and query strings

Monitoring Recommendations

  • Log and alert on Mako template resolution errors and lookups that fall back to filesystem access outside expected directories
  • Monitor file access telemetry on Windows web servers for the Python process opening files outside the template root
  • Correlate authentication-free HTTP requests containing traversal patterns with subsequent sensitive file reads

How to Mitigate CVE-2026-44307

Immediate Actions Required

  • Upgrade Mako to version 1.3.12 or later on all Windows-hosted applications
  • Audit application endpoints that forward user input to TemplateLookup and add input validation
  • Restrict filesystem permissions for the account running Mako-based services to limit blast radius of arbitrary reads

Patch Information

The issue is fixed in Mako 1.3.12. The patch normalizes backslash characters to forward slashes before path resolution in mako/lookup.py. See the Mako 1.3.12 release notes, the upstream commit, and the issue discussion for full technical context.

Workarounds

  • Reject or sanitize any user-supplied template URI containing \, %5C, or .. sequences before invoking Mako
  • Whitelist allowed template names against a static list rather than passing arbitrary URIs to TemplateLookup
  • Run Windows-hosted Mako applications under a low-privilege service account with read access limited to the template directory
bash
# Upgrade Mako to the patched release
pip install --upgrade "Mako>=1.3.12"

# Verify installed version
python -c "import mako; print(mako.__version__)"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePath Traversal

  • Vendor/TechMako

  • SeverityHIGH

  • CVSS Score8.7

  • EPSS Probability0.22%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-22
  • Technical References
  • GitHub Commit Log

  • GitHub Issue Discussion

  • GitHub Release Tag

  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-41205: Mako Template Library Path Traversal Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English