Vulnerability Description
A vulnerability in the `filestring()` function of the `nltk.util` module in nltk version 3.9.2 allows arbitrary file read due to improper validation of input paths. The function directly opens files specified by user input without sanitization, enabling attackers to access sensitive system files by providing absolute paths or traversal paths. This vulnerability can be exploited locally or remotely, particularly in scenarios where the function is used in web APIs or other interfaces that accept user-supplied input.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nltk | Nltk | 3.9.2 |
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/007b84f8-418e-4300-99d0-bf504c2f97ebExploitVendor Advisory
- https://huntr.com/bounties/007b84f8-418e-4300-99d0-bf504c2f97ebExploitVendor Advisory
FAQ
What is CVE-2026-0846?
CVE-2026-0846 is a vulnerability with a CVSS score of 7.5 (HIGH). A vulnerability in the `filestring()` function of the `nltk.util` module in nltk version 3.9.2 allows arbitrary file read due to improper validation of input paths. The function directly opens files s...
How severe is CVE-2026-0846?
CVE-2026-0846 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-0846?
Check the references section above for vendor advisories and patch information. Affected products include: Nltk Nltk.