Emmett is a full-stack Python web framework designed with simplicity. From 2.5.0 to before 2.8.1, the RSGI static handler for Emmett's internal assets (/__emmett__ paths) is vulnerable to path traversal attacks. An attacker can use ../ sequences (eg /__emmett__/../rsgi/handlers.py) to read arbitrary files outside the assets directory. This vulnerability is fixed in 2.8.1.
References
| Link | Resource |
|---|---|
| https://github.com/emmett-framework/emmett/security/advisories/GHSA-pr46-2v3c-5356 | Vendor Advisory |
Configurations
History
16 Apr 2026, 04:31
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Emmett emmett
Emmett |
|
| References | () https://github.com/emmett-framework/emmett/security/advisories/GHSA-pr46-2v3c-5356 - Vendor Advisory | |
| CPE | cpe:2.3:a:emmett:emmett:*:*:*:*:*:*:*:* |
07 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-07 22:16
Updated : 2026-04-16 04:31
NVD link : CVE-2026-39847
Mitre link : CVE-2026-39847
CVE.ORG link : CVE-2026-39847
JSON object : View
Products Affected
emmett
- emmett
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
