A vulnerability in the `filestring()` function of the `nltk.util` module in nltk version 3.9.2 allows arbitrary file read due to improper validation of input paths. The function directly opens files specified by user input without sanitization, enabling attackers to access sensitive system files by providing absolute paths or traversal paths. This vulnerability can be exploited locally or remotely, particularly in scenarios where the function is used in web APIs or other interfaces that accept user-supplied input.
References
Configurations
No configuration.
History
12 Mar 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://huntr.com/bounties/007b84f8-418e-4300-99d0-bf504c2f97eb - |
11 Mar 2026, 13:53
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
09 Mar 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-09 20:16
Updated : 2026-03-12 15:16
NVD link : CVE-2026-0846
Mitre link : CVE-2026-0846
CVE.ORG link : CVE-2026-0846
JSON object : View
Products Affected
No product.
CWE
CWE-36
Absolute Path Traversal
