CVE-2026-0846 PUBLISHED

Arbitrary File Read via Absolute Path Input in nltk.util.filestring()

Assigner: @huntr_ai
Reserved: 10.01.2026 Published: 09.03.2026 Updated: 09.03.2026

A vulnerability in the filestring() function of the nltk.util module in nltk version 3.9.2 allows arbitrary file read due to improper validation of input paths. The function directly opens files specified by user input without sanitization, enabling attackers to access sensitive system files by providing absolute paths or traversal paths. This vulnerability can be exploited locally or remotely, particularly in scenarios where the function is used in web APIs or other interfaces that accept user-supplied input.

Metrics

CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
CVSS Score: 8.6

Product Status

Vendor nltk
Product nltk/nltk
Versions
  • affected from unspecified to latest (incl.)

References

Problem Types

  • CWE-36 Absolute Path Traversal CWE