<?xml version="1.0" encoding="UTF-8"?>
<VrdaData refvuldefversion="1.2" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://vrda.jpcert.or.jp" xsi:schemaLocation="http://vrda.jpcert.or.jp/feed/xsd/vrda_data.xsd">
  <VrdaDataProvider>
    <Name>JVN iPedia</Name>
    <URL>http://jvndb.jvn.jp</URL>
  </VrdaDataProvider>
  <VrdaDataSourceType>Advisory</VrdaDataSourceType>
  <Vulinfo revisionno="1" lang="ja" invalidated="false">
    <VulinfoID>JVNDB-2025-020967</VulinfoID>
    <VulinfoData>
      <Title>Pallets project &#12398; Werkzeug &#12395;&#12362;&#12369;&#12427; Windows &#12487;&#12496;&#12452;&#12473;&#21517;&#12398;&#20966;&#29702;&#12395;&#38306;&#12377;&#12427;&#33030;&#24369;&#24615;</Title>
      <VulinfoDescription>
        <Overview>Pallets project &#12398; Werkzeug &#12395;&#12399;&#12289;Windows &#12487;&#12496;&#12452;&#12473;&#21517;&#12398;&#20966;&#29702;&#12395;&#38306;&#12377;&#12427;&#33030;&#24369;&#24615;&#12364;&#23384;&#22312;&#12375;&#12414;&#12377;&#12290;</Overview>
      </VulinfoDescription>
      <Affected>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/a:palletsprojects:werkzeug</Lapt>
        </AffectedItem>
      </Affected>
      <FactAnalysis>
      </FactAnalysis>
      <Related>
        <RelatedItem relationtype="self" origin="jvnipedia">
          <URL>https://jvndb.jvn.jp/ja/contents/2025/JVNDB-2025-020967.html</URL>
        </RelatedItem>
        <RelatedItem relationtype="alternate" origin="other">
          <Name>Common Vulnerabilities and Exposures (CVE)</Name>
          <VulinfoID>CVE-2025-66221</VulinfoID>
          <URL>https://www.cve.org/CVERecord?id=CVE-2025-66221</URL>
        </RelatedItem>
        <RelatedItem relationtype="alternate" origin="other">
          <Name>National Vulnerability Database (NVD)</Name>
          <VulinfoID>CVE-2025-66221</VulinfoID>
          <URL>https://nvd.nist.gov/vuln/detail/CVE-2025-66221</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>JVNDB</Name>
          <VulinfoID>CWE-67</VulinfoID>
          <Title>Windows &#12487;&#12496;&#12452;&#12473;&#21517;&#12398;&#19981;&#36969;&#20999;&#12394;&#20966;&#29702;</Title>
          <URL>https://cwe.mitre.org/data/definitions/67.html</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>github.com (4b833376a45c323a189cd11d2362bcffdb1c0c13)</VulinfoID>
          <URL>https://github.com/pallets/werkzeug/commit/4b833376a45c323a189cd11d2362bcffdb1c0c13</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>github.com (3.1.4)</VulinfoID>
          <URL>https://github.com/pallets/werkzeug/releases/tag/3.1.4</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>github.com (GHSA-hgf8-39gv-g3f2)</VulinfoID>
          <URL>https://github.com/pallets/werkzeug/security/advisories/GHSA-hgf8-39gv-g3f2</URL>
        </RelatedItem>
      </Related>
      <DateFirstPublished>2025-12-05T11:38:17+09:00</DateFirstPublished>
      <DateLastUpdated>2025-12-05T11:38:17+09:00</DateLastUpdated>
    </VulinfoData>
  </Vulinfo>
</VrdaData>
