Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-469j-vmhf-r6v7 | NLTK has a Downloader Path Traversal Vulnerability (AFO) - Arbitrary File Overwrite |
Mon, 23 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:nltk:nltk:*:*:*:*:*:*:*:* |
Mon, 23 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nltk
Nltk nltk |
|
| Vendors & Products |
Nltk
Nltk nltk |
Fri, 20 Mar 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. In versions 3.9.3 and prior, the NLTK downloader does not validate the `subdir` and `id` attributes when processing remote XML index files. Attackers can control a remote XML index server to provide malicious values containing path traversal sequences (such as `../`), which can lead to arbitrary directory creation, arbitrary file creation, and arbitrary file overwrite. Commit 89fe2ec2c6bae6e2e7a46dad65cc34231976ed8a patches the issue. | |
| Title | NLTK has a Downloader Path Traversal Vulnerability (AFO) - Arbitrary File Overwrite | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-23T16:46:42.554Z
Reserved: 2026-03-18T02:42:27.508Z
Link: CVE-2026-33236
Updated: 2026-03-23T16:46:38.279Z
Status : Analyzed
Published: 2026-03-20T23:16:47.007
Modified: 2026-03-23T19:15:37.720
Link: CVE-2026-33236
OpenCVE Enrichment
Updated: 2026-03-25T14:34:06Z
Github GHSA