EUVD-2026-12940

| CVE-2026-3479 LOW
2026-03-18 PSF
2.1
CVSS 4.0

CVSS Vector

CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None

Lifecycle Timeline

4
Analysis Generated
Mar 18, 2026 - 18:45 vuln.today
EUVD ID Assigned
Mar 18, 2026 - 18:45 euvd
EUVD-2026-12940
Patch Released
Mar 18, 2026 - 18:45 nvd
Patch available
CVE Published
Mar 18, 2026 - 18:13 nvd
LOW 2.1

Description

pkgutil.get_data() did not validate the resource argument as documented, allowing path traversals.

Analysis

The pkgutil.get_data() function in CPython fails to properly validate the resource argument, enabling path traversal attacks that allow unauthorized information disclosure. This vulnerability affects CPython across multiple versions and could permit attackers to read arbitrary files from the system where Python code is executing. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

During next maintenance window: Apply vendor patches when convenient. Verify path traversal controls are in place.

Sign in for detailed remediation steps.

Priority Score

11
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +10
POC: 0

Share

EUVD-2026-12940 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy