CVE-2026-28684 PUBLISHED

python-dotenv: Symlink following in set_key allows arbitrary file overwrite via cross-device rename fallback

Assigner: GitHub_M
Reserved: 02.03.2026 Published: 20.04.2026 Updated: 20.04.2026

python-dotenv reads key-value pairs from a .env file and can set them as environment variables. Prior to version 1.2.2, set_key() and unset_key() in python-dotenv follow symbolic links when rewriting .env files, allowing a local attacker to overwrite arbitrary files via a crafted symlink when a cross-device rename fallback is triggered. Users should upgrade to v.1.2.2 or, as a workaround, apply the patch manually.

Metrics

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
CVSS Score: 6.6

Product Status

Vendor theskumar
Product python-dotenv
Versions
  • Version < 1.2.2 is affected

References

Problem Types

  • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE
  • CWE-61: UNIX Symbolic Link (Symlink) Following CWE