Ad

CVE-2026-3479

LOW EPSS 0.01%
Updated Apr 07, 2026
Python Software Foundation
Parameter Value
Type CWE-22 (Path Traversal)
Vendor Python Software Foundation
Public PoC No

DISPUTED: The project has clarified that the documentation was incorrect, and that pkgutil.get_data() has the same security model as open(). The documentation has been updated to clarify this point. There is no vulnerability in the function if following the intended security model. pkgutil.get_data() did not validate the resource argument as documented, allowing path traversals.

Attack Parameters

Attack Vector
Physical
Requires physical access
Attack Complexity
Low
Easy to exploit
Attack Requirements
None
No additional conditions
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
None
No data leak
Integrity
None
No data modification
Availability
None
No disruption

CVSS Vector v4.0

Weakness Type (CWE)

Vulnerable Products

python software foundation:cpython