ROOT-APP-PYPI-CVE-2022-40023

Source
https://root.io/security/ROOT-APP-PYPI-CVE-2022-40023
Import Source
https://api.root.io/external/osv/ROOT-APP-PYPI-CVE-2022-40023.json
JSON Data
https://api.test.osv.dev/v1/vulns/ROOT-APP-PYPI-CVE-2022-40023
Aliases
Published
2025-11-28T10:33:22Z
Modified
2026-01-06T15:12:09.650067Z
Summary
CVE-2022-40023 in rootio-Mako - Patched by Root
Details

Root has patched CVE-2022-40023 in the rootio-Mako package for Root:PyPI. Multiple fixed versions available.

Database specific
{
    "distro_version": "",
    "source": "Root",
    "distro": "pypi"
}
References

Affected packages

Root:PyPI / rootio-Mako

Package

Name
rootio-Mako
Purl
pkg:generic/root/rootio-Mako@1.2.1+root.io.1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.1+root.io.1

Database specific

all_fixed_versions

[
    "1.2.1+root.io.1"
]

source

"https://api.root.io/external/osv/ROOT-APP-PYPI-CVE-2022-40023.json"

upstream_version

"1.2.1"

root_patched

true

root_patch_version

"root.io.1"

total_fixed_versions

1.0