eml_parser serves as a python module for parsing eml files and returning various information found in the e-mail as well as computed information. Prior to version 2.0.1, the official example script examples/recursively_extract_attachments.py contains a path traversal vulnerability that allows arbitrary file write outside the intended output directory. Attachment filenames extracted from parsed emails are directly used to construct output file paths without any sanitization, allowing an attacker-controlled filename to escape the target directory. This issue has been patched in version 2.0.1.
References
| Link | Resource |
|---|---|
| https://github.com/GOVCERT-LU/eml_parser/commit/99af03a09a90aaaaadd0ed2ffb5eea46d1ea2cc9 | Patch |
| https://github.com/GOVCERT-LU/eml_parser/issues/88 | Issue Tracking |
| https://github.com/GOVCERT-LU/eml_parser/security/advisories/GHSA-389r-rccm-h3h5 | Exploit Mitigation Vendor Advisory |
Configurations
History
11 Mar 2026, 22:02
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/GOVCERT-LU/eml_parser/commit/99af03a09a90aaaaadd0ed2ffb5eea46d1ea2cc9 - Patch | |
| References | () https://github.com/GOVCERT-LU/eml_parser/issues/88 - Issue Tracking | |
| References | () https://github.com/GOVCERT-LU/eml_parser/security/advisories/GHSA-389r-rccm-h3h5 - Exploit, Mitigation, Vendor Advisory | |
| First Time |
Govcert.lu
Govcert.lu eml Parser |
|
| Summary |
|
|
| CPE | cpe:2.3:a:govcert.lu:eml_parser:*:*:*:*:*:python:*:* |
07 Mar 2026, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-07 16:15
Updated : 2026-03-11 22:02
NVD link : CVE-2026-29780
Mitre link : CVE-2026-29780
CVE.ORG link : CVE-2026-29780
JSON object : View
Products Affected
govcert.lu
- eml_parser
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
