CVE-2026-0846
Published: 09 March 2026
Summary
CVE-2026-0846 is a high-severity Absolute Path Traversal (CWE-36) vulnerability in Nltk Nltk. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 24.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal enables direct arbitrary file reads from local system (T1005); exposed via web APIs/public apps allows exploitation of public-facing services (T1190).
NVD Description
A vulnerability in the `filestring()` function of the `nltk.util` module in nltk version 3.9.2 allows arbitrary file read due to improper validation of input paths. The function directly opens files specified by user input without sanitization, enabling attackers to access…
more
sensitive system files by providing absolute paths or traversal paths. This vulnerability can be exploited locally or remotely, particularly in scenarios where the function is used in web APIs or other interfaces that accept user-supplied input.
Deeper analysisAI
CVE-2026-0846 is a path traversal vulnerability (CWE-36) in the `filestring()` function of the `nltk.util` module in NLTK version 3.9.2. The function directly opens files specified by user input without proper path sanitization, enabling arbitrary file reads on the system hosting the affected software. This flaw affects applications using NLTK 3.9.2 that invoke `filestring()` with unsanitized inputs.
The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), allowing unauthenticated remote attackers to exploit it over the network with low complexity and no user interaction. Exploitation is feasible in scenarios where the function processes user-supplied paths, such as web APIs or other interfaces, granting attackers read access to sensitive system files via absolute paths or directory traversals.
Advisories on Huntr.com (https://huntr.com/bounties/007b84f8-418e-4300-99d0-bf504c2f97eb) provide details on the issue through a reported bounty.
NLTK, a Python library for natural language processing, has relevance to AI/ML workflows where vulnerable code may be deployed in data processing pipelines.
Details
- CWE(s)