CVE-2026-3479
pkgutil.get_data() does not enforce documented restrictions
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
1th
DISPUTED: The project has clarified that the documentation was incorrect, and that pkgutil.get_data() has the same security model as open(). The documentation has been updated to clarify this point. There is no vulnerability in the function if following the intended security model. pkgutil.get_data() did not validate the resource argument as documented, allowing path traversals.
| Vendor | python software foundation |
| Product | cpython |
| Published | Mar 18, 2026 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for python software foundation cpython
Be the first to know when new unknown vulnerabilities affecting python software foundation cpython are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Python Software Foundation / CPython
0 < 3.13.13 3.14.0 < 3.14.4 3.15.0a1 < 3.15.0a8
References
github.com: https://github.com/python/cpython/pull/146122 mail.python.org: https://mail.python.org/archives/list/[email protected]/thread/WYLLVQOOCKGK73JM7Z7ZSNOJC4N7BAWY/ github.com: https://github.com/python/cpython/issues/146121 github.com: https://github.com/python/cpython/commit/bcdf231946b1da8bdfbab4c05539bb0cc964a1c7 github.com: https://github.com/python/cpython/commit/5af6ce3e7b643a30a02d22245c1e3f4a8bc0a1fe github.com: https://github.com/python/cpython/commit/cf59bf76470f3d75ad47d80ffb8ce76b64b5e943 github.com: https://github.com/python/cpython/commit/d786d59a8f7196bb630100a869f28ad13436b59c