CVE-2026-0846
Publication date 9 March 2026
Last updated 26 March 2026
Ubuntu priority
Cvss 3 Severity Score
Description
A vulnerability in the `filestring()` function of the `nltk.util` module in nltk version 3.9.2 allows arbitrary file read due to improper validation of input paths. The function directly opens files specified by user input without sanitization, enabling attackers to access sensitive system files by providing absolute paths or traversal paths. This vulnerability can be exploited locally or remotely, particularly in scenarios where the function is used in web APIs or other interfaces that accept user-supplied input.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| nltk | 25.10 questing |
Vulnerable
|
| 24.04 LTS noble |
Vulnerable
|
|
| 22.04 LTS jammy |
Vulnerable
|
|
| 20.04 LTS focal |
Vulnerable
|
|
| 18.04 LTS bionic |
Vulnerable
|
|
| 16.04 LTS xenial |
Vulnerable
|
|
| 14.04 LTS trusty |
Vulnerable
|
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | Low |
| Availability impact | Low |
| Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L |
References
Other references
- https://www.cve.org/CVERecord?id=CVE-2026-0846
- https://huntr.com/bounties/007b84f8-418e-4300-99d0-bf504c2f97eb
- https://github.com/nltk/nltk/pull/3485
- https://github.com/nltk/nltk/commit/1fc626969f013bba104a40e5e760b9d67b2994ea
- https://github.com/nltk/nltk/commit/5c46f3dac7e0eb10ee7d9f7be9fe732b0ec0af25