LeakyCreds
NewInstant webhook alerts now available β€” notified within seconds of any credential detection.Learn more β†’

CVE-2026-0846 - Vulnerability Analysis

HighCVSS: 8.6

Last Updated: March 11, 2026

nltk - Path Traversal

Published: March 9, 2026Updated: March 11, 2026Remote Exploitable

Overview

nltk 3.9.2 contains a path traversal caused by improper validation of input paths in the filestring() function of nltk.util, letting attackers read arbitrary files, exploit requires user-supplied input to filestring().

Severity & Score

Severity: High
CVSS Score: 8.6
EPSS Score: 7.7%(Probability of exploitation in next 30 days)

Impact

Attackers can read arbitrary files, potentially exposing sensitive system information.

Mitigation

Update to the latest version of nltk.

Social Media Activity(2 posts)

Offensive Sequence
Offensive Sequence
@offseq
Mar 9, 2026

🚨 CVE-2026-0846: HIGH severity absolute path traversal in nltk v3.9.2 (filestring()). Remote attackers can read files if user input isn’t sanitized. Patch when available & validate inputs! https://radar.offseq.com/threat/cve-2026-0846-cwe-36-absolute-path-traversal-in-nl-799595df #OffSeq #nltk #vuln #infosec

View original post
TheHackerWire
TheHackerWire
@thehackerwire
Mar 9, 2026

🟠 CVE-2026-0846 - High (8.6) A vulnerability in the `filestring()` function of the `nltk.util` module in nltk version 3.9.2 allows arbitrary file read due to improper validation of input paths. The function directly opens files specified by user input without sanitization, en... πŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-0846/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-0846
Severity
High
CVSS Score
8.6
Type
path_traversal
Status
unconfirmed
EPSS
7.7%
Social Posts
2

CWE

  • CWE-36

CVSS Metrics

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L

EPSS Score

7.7%Probability of exploitation in the next 30 days