CVE-2026-3479
Severity CVSS v4.0:
NONE
Type:
CWE-22
Path Traversal
Publication date:
18/03/2026
Last modified:
07/04/2026
Description
DISPUTED: The project has clarified that the documentation was incorrect, and that pkgutil.get_data() has the same security model as open(). The documentation has been updated to clarify this point. There is no vulnerability in the function if following the intended security model.<br />
<br />
pkgutil.get_data() did not validate the resource argument as documented, allowing path traversals.
Impact
Base Score 4.0
0.00
Severity 4.0
NONE
References to Advisories, Solutions, and Tools
- https://github.com/python/cpython/commit/5af6ce3e7b643a30a02d22245c1e3f4a8bc0a1fe
- https://github.com/python/cpython/commit/bcdf231946b1da8bdfbab4c05539bb0cc964a1c7
- https://github.com/python/cpython/commit/cf59bf76470f3d75ad47d80ffb8ce76b64b5e943
- https://github.com/python/cpython/commit/d786d59a8f7196bb630100a869f28ad13436b59c
- https://github.com/python/cpython/issues/146121
- https://github.com/python/cpython/pull/146122
- https://mail.python.org/archives/list/security-announce@python.org/thread/WYLLVQOOCKGK73JM7Z7ZSNOJC4N7BAWY/



