CVE-2026-39847

Emmett is a full-stack Python web framework designed with simplicity. From 2.5.0 to before 2.8.1, the RSGI static handler for Emmett's internal assets (/__emmett__ paths) is vulnerable to path traversal attacks. An attacker can use ../ sequences (eg /__emmett__/../rsgi/handlers.py) to read arbitrary files outside the assets directory. This vulnerability is fixed in 2.8.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:emmett:emmett:*:*:*:*:*:*:*:*

History

16 Apr 2026, 04:31

Type Values Removed Values Added
First Time Emmett emmett
Emmett
References () https://github.com/emmett-framework/emmett/security/advisories/GHSA-pr46-2v3c-5356 - () https://github.com/emmett-framework/emmett/security/advisories/GHSA-pr46-2v3c-5356 - Vendor Advisory
CPE cpe:2.3:a:emmett:emmett:*:*:*:*:*:*:*:*

07 Apr 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-07 22:16

Updated : 2026-04-16 04:31


NVD link : CVE-2026-39847

Mitre link : CVE-2026-39847

CVE.ORG link : CVE-2026-39847


JSON object : View

Products Affected

emmett

  • emmett
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')