CVE-2026-0846
Received Received - Intake
Arbitrary File Read in NLTK 3.9.2 filestring() Function

Publication date: 2026-03-09

Last updated on: 2026-04-17

Assigner: huntr.dev

Description
A vulnerability in the `filestring()` function of the `nltk.util` module in nltk version 3.9.2 allows arbitrary file read due to improper validation of input paths. The function directly opens files specified by user input without sanitization, enabling attackers to access sensitive system files by providing absolute paths or traversal paths. This vulnerability can be exploited locally or remotely, particularly in scenarios where the function is used in web APIs or other interfaces that accept user-supplied input.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-09
Last Modified
2026-04-17
Generated
2026-05-07
AI Q&A
2026-03-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
nltk nltk 3.9.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-36 The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize absolute path sequences such as "/abs/path" that can resolve to a location that is outside of that directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the filestring() function of the nltk.util module in nltk version 3.9.2. The function improperly validates input paths and directly opens files specified by user input without sanitization. This allows attackers to read arbitrary files on the system by providing absolute or traversal paths.


How can this vulnerability impact me? :

The vulnerability can be exploited both locally and remotely, especially in environments where the filestring() function is used in web APIs or other interfaces that accept user input. Exploitation can lead to unauthorized access to sensitive system files, potentially exposing confidential information and causing confidentiality, integrity, and availability impacts.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart