A vulnerability in the `filestring()` function of the `nltk.util` module in nltk version 3.9.2 allows arbitrary file read due to improper validation of input paths. The function directly opens files specified by user input without sanitization, enabling attackers to access sensitive system files by providing absolute paths or traversal paths. This vulnerability can be exploited locally or remotely, particularly in scenarios where the function is used in web APIs or other interfaces that accept user-supplied input.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 09 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the `filestring()` function of the `nltk.util` module in nltk version 3.9.2 allows arbitrary file read due to improper validation of input paths. The function directly opens files specified by user input without sanitization, enabling attackers to access sensitive system files by providing absolute paths or traversal paths. This vulnerability can be exploited locally or remotely, particularly in scenarios where the function is used in web APIs or other interfaces that accept user-supplied input.
Title Arbitrary File Read via Absolute Path Input in nltk.util.filestring()
Weaknesses CWE-36
References
Metrics cvssV3_0

{'score': 8.6, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2026-03-09T19:19:09.464Z

Reserved: 2026-01-10T23:22:13.648Z

Link: CVE-2026-0846

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-09T20:16:05.703

Modified: 2026-03-09T20:16:05.703

Link: CVE-2026-0846

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses