Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-76hw-p97h-883f | gdown Affected by Arbitrary File Write via Path Traversal in gdown.extractall |
Fri, 01 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:wkentaro:gdown:*:*:*:*:*:*:*:* |
Mon, 20 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wkentaro
Wkentaro gdown |
|
| Vendors & Products |
Wkentaro
Wkentaro gdown |
Sat, 18 Apr 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | gdown is a Google Drive public file/folder downloader. Versions prior to 5.2.2 are vulnerable to a Path Traversal attack within the extractall functionality. When extracting a maliciously crafted ZIP or TAR archive, the library fails to sanitize or validate the filenames of the archive members. This allow files to be written outside the intended destination directory, potentially leading to arbitrary file overwrite and Remote Code Execution (RCE). Version 5.2.2 contains a fix. | |
| Title | gdown Affected by Arbitrary File Write via Path Traversal in gdown.extractall | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-20T15:50:02.983Z
Reserved: 2026-04-13T19:50:42.114Z
Link: CVE-2026-40491
Updated: 2026-04-20T15:49:54.248Z
Status : Analyzed
Published: 2026-04-18T03:16:13.157
Modified: 2026-05-01T18:24:32.940
Link: CVE-2026-40491
No data.
OpenCVE Enrichment
Updated: 2026-04-20T14:58:49Z
Github GHSA