Cyber Posture

CVE-2026-33236

HighPublic PoC

Published: 20 March 2026

Published
20 March 2026
Modified
23 March 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
EPSS Score 0.0002 5.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-33236 is a high-severity Path Traversal (CWE-22) vulnerability in Nltk Nltk. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Ingress Tool Transfer (T1105); ranked at the 5.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Ingress Tool Transfer (T1105) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification, reporting, and patching of flaws like the path traversal in NLTK downloader, directly enabling deployment of the fix in commit 89fe2ec2c6bae6e2e7a46dad65cc34231976ed8a.

prevent

Mandates validation of information inputs from remote sources, such as subdir and id attributes in XML index files, to block path traversal sequences like ../ leading to arbitrary file operations.

prevent

Controls and monitors user-installed software like NLTK, ensuring only authorized and patched versions are deployed to mitigate exploitation via vulnerable downloader components.

MITRE ATT&CK Enterprise TechniquesAI

T1105 Ingress Tool Transfer Command And Control
Adversaries may transfer tools or other files from an external system into a compromised environment.
T1565.001 Stored Data Manipulation Impact
Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
Why these techniques?

Path traversal in NLTK downloader enables arbitrary file creation/overwrite from attacker-controlled index, directly mapping to ingress of arbitrary content (T1105) and stored data manipulation via overwrites (T1565.001).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. In versions 3.9.3 and prior, the NLTK downloader does not validate the `subdir` and `id` attributes…

more

when processing remote XML index files. Attackers can control a remote XML index server to provide malicious values containing path traversal sequences (such as `../`), which can lead to arbitrary directory creation, arbitrary file creation, and arbitrary file overwrite. Commit 89fe2ec2c6bae6e2e7a46dad65cc34231976ed8a patches the issue.

Deeper analysisAI

CVE-2026-33236 is a path traversal vulnerability (CWE-22) in the NLTK downloader component of the Natural Language Toolkit (NLTK), an open-source Python suite of modules, datasets, and tutorials for natural language processing research and development. In versions 3.9.3 and prior, the downloader does not validate the `subdir` and `id` attributes when processing remote XML index files, enabling attackers to inject path traversal sequences such as `../`.

An attacker controlling a remote XML index server exploited by a victim can supply malicious attribute values, resulting in arbitrary directory creation, arbitrary file creation, and arbitrary file overwrite on the victim's filesystem. Exploitation requires network access, low complexity, no privileges, and user interaction—such as invoking the NLTK downloader to fetch from the attacker's server—with a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H).

The vulnerability is addressed by commit 89fe2ec2c6bae6e2e7a46dad65cc34231976ed8a in the NLTK repository. Security advisories recommend updating to a patched version of NLTK and avoiding untrusted remote index servers; details are provided in the GitHub security advisory GHSA-469j-vmhf-r6v7.

Details

CWE(s)

Affected Products

nltk
nltk
≤ 3.9.3

CVEs Like This One

CVE-2026-0847Same product: Nltk Nltk
CVE-2026-33231Same product: Nltk Nltk
CVE-2026-0846Same product: Nltk Nltk
CVE-2026-39305Shared CWE-22
CVE-2026-26065Shared CWE-22
CVE-2025-27395Shared CWE-22
CVE-2025-25371Shared CWE-22
CVE-2026-27699Shared CWE-22
CVE-2026-20660Shared CWE-22
CVE-2026-33645Shared CWE-22

References