Home

Description

A vulnerability in the `filestring()` function of the `nltk.util` module in nltk version 3.9.2 allows arbitrary file read due to improper validation of input paths. The function directly opens files specified by user input without sanitization, enabling attackers to access sensitive system files by providing absolute paths or traversal paths. This vulnerability can be exploited locally or remotely, particularly in scenarios where the function is used in web APIs or other interfaces that accept user-supplied input.

PUBLISHED Reserved 2026-01-10 | Published 2026-03-09 | Updated 2026-03-12 | Assigner @huntr_ai




HIGH: 8.6CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L

Problem types

CWE-36 Absolute Path Traversal

Product status

Any version
affected

References

huntr.com/bounties/007b84f8-418e-4300-99d0-bf504c2f97eb exploit

huntr.com/bounties/007b84f8-418e-4300-99d0-bf504c2f97eb

cve.org (CVE-2026-0846)

nvd.nist.gov (CVE-2026-0846)

Download JSON