EUVD-2026-13117

| CVE-2026-3029 HIGH
2026-03-19 certcc GHSA-cxqh-p2w9-fmr7
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 19, 2026 - 16:00 vuln.today
EUVD ID Assigned
Mar 19, 2026 - 16:00 euvd
EUVD-2026-13117
CVE Published
Mar 19, 2026 - 15:53 nvd
HIGH 7.5

Description

A path traversal and arbitrary file write vulnerability exist in the embedded get function in '_main_.py' in PyMuPDF version, 1.26.5.

Analysis

PyMuPDF versions up to 1.26.5 allow unauthenticated remote attackers to write arbitrary files to the system through path traversal in the embedded get function. This vulnerability enables denial of service attacks and potential system compromise without requiring authentication or user interaction. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 7 days: Identify all affected systems running PyMuPDF and apply vendor patches promptly. Monitor vendor channels for patch availability.

Sign in for detailed remediation steps.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Vendor Status

Debian

pymupdf
Release Status Fixed Version Urgency
bullseye vulnerable 1.17.4+ds1-2 -
bookworm vulnerable 1.21.1+ds1-1 -
trixie vulnerable 1.25.4+ds1-3 -
forky, sid fixed 1.26.7+ds1-1 -
(unstable) fixed 1.26.7+ds1-1 -

Share

EUVD-2026-13117 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy