Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-h8wq-7xc4-p3qx | NLTK has Arbitrary File Read via Absolute Path Input in nltk.util.filestring() |
Fri, 17 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nltk nltk
|
|
| CPEs | cpe:2.3:a:nltk:nltk:3.9.2:*:*:*:*:*:*:* | |
| Vendors & Products |
Nltk nltk
|
Thu, 12 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nltk
Nltk nltk/nltk |
|
| Vendors & Products |
Nltk
Nltk nltk/nltk |
Tue, 10 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 09 Mar 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the `filestring()` function of the `nltk.util` module in nltk version 3.9.2 allows arbitrary file read due to improper validation of input paths. The function directly opens files specified by user input without sanitization, enabling attackers to access sensitive system files by providing absolute paths or traversal paths. This vulnerability can be exploited locally or remotely, particularly in scenarios where the function is used in web APIs or other interfaces that accept user-supplied input. | |
| Title | Arbitrary File Read via Absolute Path Input in nltk.util.filestring() | |
| Weaknesses | CWE-36 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2026-03-12T14:48:25.181Z
Reserved: 2026-01-10T23:22:13.648Z
Link: CVE-2026-0846
Updated: 2026-03-12T14:48:13.712Z
Status : Analyzed
Published: 2026-03-09T20:16:05.703
Modified: 2026-04-17T20:57:00.540
Link: CVE-2026-0846
OpenCVE Enrichment
Updated: 2026-04-16T04:00:09Z
Github GHSA