Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14009: CWE-94 Improper Control of Generation of Code in nltk nltk/nltk

0
Critical
VulnerabilityCVE-2025-14009cvecve-2025-14009cwe-94
Published: Wed Feb 18 2026 (02/18/2026, 17:45:17 UTC)
Source: CVE Database V5
Vendor/Project: nltk
Product: nltk/nltk

Description

CVE-2025-14009 is a critical remote code execution vulnerability in the NLTK downloader component, affecting all versions. The vulnerability stems from the use of zipfile. extractall() without path validation, allowing malicious zip packages to execute arbitrary Python code upon extraction and import. Exploitation requires no authentication or user interaction and can lead to full system compromise, including filesystem and network access. This flaw arises because NLTK trusts all downloaded packages without verifying their integrity or safety. The vulnerability has a CVSS score of 10, indicating critical severity. No known exploits are currently in the wild, but the impact potential is severe. European organizations using NLTK in data science, NLP, or AI workflows are at risk, especially those in research, finance, and government sectors. Immediate mitigation involves restricting or auditing NLTK downloads, applying patches once available, and isolating environments where NLTK is used. Countries with strong AI and data science sectors, such as Germany, France, and the UK, are most likely to be affected.

AI-Powered Analysis

AILast updated: 02/19/2026, 05:40:31 UTC

Technical Analysis

CVE-2025-14009 is a critical vulnerability in the Natural Language Toolkit (NLTK), a widely used Python library for natural language processing. The flaw exists in the downloader component, specifically in the _unzip_iter function within nltk/downloader.py. This function uses Python's zipfile.extractall() method to extract downloaded packages without performing any path validation or security checks. As a result, an attacker can craft a malicious zip archive containing Python files, such as __init__.py, that get executed automatically when imported by the NLTK library. Because NLTK assumes all downloaded packages are trusted, it does not verify the integrity or origin of these packages, leading to improper control over code generation (CWE-94). Exploiting this vulnerability requires no privileges, no user interaction, and can be triggered remotely by causing the victim to download and extract a malicious package. The impact includes remote code execution with the same privileges as the user running NLTK, potentially leading to full system compromise, including unauthorized file system access, network communications, and persistence mechanisms. The CVSS v3.0 base score is 10.0, reflecting the critical nature of this vulnerability with network attack vector, low attack complexity, no privileges required, no user interaction, and complete confidentiality, integrity, and availability impact. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to any environment using NLTK for data processing or AI workflows.

Potential Impact

For European organizations, the impact of CVE-2025-14009 is substantial. NLTK is widely used in academia, research institutions, financial services, healthcare, and government agencies for natural language processing tasks. Exploitation could lead to unauthorized access to sensitive data, intellectual property theft, disruption of critical AI and data processing pipelines, and lateral movement within networks. The ability to execute arbitrary code remotely without authentication means attackers can deploy malware, ransomware, or establish persistent backdoors. This is particularly concerning for organizations handling personal data under GDPR, as breaches could result in significant regulatory penalties and reputational damage. The vulnerability also threatens cloud-based AI services and collaborative research platforms prevalent in Europe. Given the criticality and ease of exploitation, organizations face a high risk of operational disruption and data compromise if unmitigated.

Mitigation Recommendations

To mitigate CVE-2025-14009, European organizations should immediately implement the following measures: 1) Restrict or disable the use of the NLTK downloader in untrusted environments or where package sources cannot be verified. 2) Manually verify the integrity and origin of all NLTK packages before downloading and extracting, preferably using cryptographic signatures or checksums once available. 3) Use sandboxed or containerized environments to run NLTK processes, limiting the potential impact of code execution. 4) Monitor network traffic and logs for unusual download activity related to NLTK package retrieval. 5) Apply any patches or updates released by the NLTK project promptly. 6) Educate developers and data scientists about the risks of using untrusted packages and enforce strict policies on third-party package usage. 7) Consider alternative NLP libraries with safer package management if immediate patching is not feasible. 8) Employ endpoint protection solutions capable of detecting anomalous Python execution patterns. These steps go beyond generic advice by focusing on controlling package trust, environment isolation, and proactive monitoring tailored to this specific vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
@huntr_ai
Date Reserved
2025-12-04T09:27:21.716Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69969ef76aea4a407a3d9a78

Added to database: 2/19/2026, 5:26:15 AM

Last enriched: 2/19/2026, 5:40:31 AM

Last updated: 2/19/2026, 7:05:56 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats