Vulnerability Description
NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. In versions 3.9.3 and prior, the NLTK downloader does not validate the `subdir` and `id` attributes when processing remote XML index files. Attackers can control a remote XML index server to provide malicious values containing path traversal sequences (such as `../`), which can lead to arbitrary directory creation, arbitrary file creation, and arbitrary file overwrite. Commit 89fe2ec2c6bae6e2e7a46dad65cc34231976ed8a patches the issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nltk | Nltk | <= 3.9.3 |
Related Weaknesses (CWE)
References
- https://github.com/nltk/nltk/commit/89fe2ec2c6bae6e2e7a46dad65cc34231976ed8aPatch
- https://github.com/nltk/nltk/security/advisories/GHSA-469j-vmhf-r6v7ExploitVendor Advisory
FAQ
What is CVE-2026-33236?
CVE-2026-33236 is a vulnerability with a CVSS score of 8.1 (HIGH). NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. In versions 3.9.3 and prior, the ...
How severe is CVE-2026-33236?
CVE-2026-33236 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33236?
Check the references section above for vendor advisories and patch information. Affected products include: Nltk Nltk.