CVE-2026-29780: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in GOVCERT-LU eml_parser
eml_parser serves as a python module for parsing eml files and returning various information found in the e-mail as well as computed information. Prior to version 2.0.1, the official example script examples/recursively_extract_attachments.py contains a path traversal vulnerability that allows arbitrary file write outside the intended output directory. Attachment filenames extracted from parsed emails are directly used to construct output file paths without any sanitization, allowing an attacker-controlled filename to escape the target directory. This issue has been patched in version 2.0.1.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-29780 affects the eml_parser Python module developed by GOVCERT-LU, specifically versions prior to 2.0.1. eml_parser is used to parse .eml email files and extract information including attachments. The vulnerability is a CWE-22 path traversal issue found in the official example script recursively_extract_attachments.py, which demonstrates how to recursively extract attachments from emails. The script directly uses attachment filenames from parsed emails to construct output file paths without any sanitization or validation. This allows an attacker to craft an email with malicious attachment filenames containing relative path components (e.g., ../) to escape the intended output directory and write files arbitrarily on the filesystem where the script runs. Such arbitrary file write can lead to overwriting critical files, potentially impacting system integrity. Exploitation requires that the vulnerable script processes attacker-controlled emails, implying user interaction or automated ingestion of malicious emails. The vulnerability does not directly impact confidentiality or availability but poses a significant integrity risk. The issue was publicly disclosed on March 7, 2026, and patched in eml_parser version 2.0.1. No known exploits in the wild have been reported to date. The CVSS v3.1 base score is 5.5, reflecting a local attack vector with low complexity, no privileges required, but requiring user interaction. The scope is unchanged as the vulnerability affects only the local system where the script runs.
Potential Impact
The primary impact of this vulnerability is the potential for arbitrary file write on systems running vulnerable versions of eml_parser, particularly when using the example script or similar code that does not sanitize attachment filenames. This can lead to integrity violations such as overwriting configuration files, scripts, or other critical files, potentially enabling further attacks or system instability. Organizations that use eml_parser in automated email processing pipelines, malware analysis, or security tools that handle untrusted emails are at risk. While the vulnerability does not directly lead to remote code execution, it can be leveraged as a stepping stone for privilege escalation or persistence if combined with other vulnerabilities or misconfigurations. The requirement for user interaction or processing of attacker-controlled emails limits the attack surface but does not eliminate risk, especially in environments that automatically process emails or attachments. The lack of known exploits suggests limited current threat but patching is essential to prevent future abuse. Overall, the vulnerability poses a medium risk to organizations relying on vulnerable eml_parser versions for email parsing and attachment extraction.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade eml_parser to version 2.0.1 or later, where the path traversal issue has been patched. Review and avoid using the vulnerable example script recursively_extract_attachments.py in production or modify it to sanitize and validate all attachment filenames before writing to disk. Implement strict filename normalization and whitelist allowed characters to prevent directory traversal sequences. Run email parsing and attachment extraction processes with the least privileges necessary, ideally in isolated or sandboxed environments to limit potential damage from arbitrary file writes. Monitor file system changes in directories used for email attachment extraction to detect suspicious activity. Additionally, apply network and email security controls to reduce the likelihood of processing malicious emails, such as advanced email filtering, attachment scanning, and user awareness training. Regularly audit and update third-party libraries to incorporate security patches promptly.
Affected Countries
United States, Germany, France, United Kingdom, Netherlands, Luxembourg, Canada, Australia, Japan, South Korea
CVE-2026-29780: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in GOVCERT-LU eml_parser
Description
eml_parser serves as a python module for parsing eml files and returning various information found in the e-mail as well as computed information. Prior to version 2.0.1, the official example script examples/recursively_extract_attachments.py contains a path traversal vulnerability that allows arbitrary file write outside the intended output directory. Attachment filenames extracted from parsed emails are directly used to construct output file paths without any sanitization, allowing an attacker-controlled filename to escape the target directory. This issue has been patched in version 2.0.1.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2026-29780 affects the eml_parser Python module developed by GOVCERT-LU, specifically versions prior to 2.0.1. eml_parser is used to parse .eml email files and extract information including attachments. The vulnerability is a CWE-22 path traversal issue found in the official example script recursively_extract_attachments.py, which demonstrates how to recursively extract attachments from emails. The script directly uses attachment filenames from parsed emails to construct output file paths without any sanitization or validation. This allows an attacker to craft an email with malicious attachment filenames containing relative path components (e.g., ../) to escape the intended output directory and write files arbitrarily on the filesystem where the script runs. Such arbitrary file write can lead to overwriting critical files, potentially impacting system integrity. Exploitation requires that the vulnerable script processes attacker-controlled emails, implying user interaction or automated ingestion of malicious emails. The vulnerability does not directly impact confidentiality or availability but poses a significant integrity risk. The issue was publicly disclosed on March 7, 2026, and patched in eml_parser version 2.0.1. No known exploits in the wild have been reported to date. The CVSS v3.1 base score is 5.5, reflecting a local attack vector with low complexity, no privileges required, but requiring user interaction. The scope is unchanged as the vulnerability affects only the local system where the script runs.
Potential Impact
The primary impact of this vulnerability is the potential for arbitrary file write on systems running vulnerable versions of eml_parser, particularly when using the example script or similar code that does not sanitize attachment filenames. This can lead to integrity violations such as overwriting configuration files, scripts, or other critical files, potentially enabling further attacks or system instability. Organizations that use eml_parser in automated email processing pipelines, malware analysis, or security tools that handle untrusted emails are at risk. While the vulnerability does not directly lead to remote code execution, it can be leveraged as a stepping stone for privilege escalation or persistence if combined with other vulnerabilities or misconfigurations. The requirement for user interaction or processing of attacker-controlled emails limits the attack surface but does not eliminate risk, especially in environments that automatically process emails or attachments. The lack of known exploits suggests limited current threat but patching is essential to prevent future abuse. Overall, the vulnerability poses a medium risk to organizations relying on vulnerable eml_parser versions for email parsing and attachment extraction.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade eml_parser to version 2.0.1 or later, where the path traversal issue has been patched. Review and avoid using the vulnerable example script recursively_extract_attachments.py in production or modify it to sanitize and validate all attachment filenames before writing to disk. Implement strict filename normalization and whitelist allowed characters to prevent directory traversal sequences. Run email parsing and attachment extraction processes with the least privileges necessary, ideally in isolated or sandboxed environments to limit potential damage from arbitrary file writes. Monitor file system changes in directories used for email attachment extraction to detect suspicious activity. Additionally, apply network and email security controls to reduce the likelihood of processing malicious emails, such as advanced email filtering, attachment scanning, and user awareness training. Regularly audit and update third-party libraries to incorporate security patches promptly.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-04T16:26:02.898Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69ac44bec48b3f10ffa88854
Added to database: 3/7/2026, 3:31:10 PM
Last enriched: 3/14/2026, 7:56:44 PM
Last updated: 4/22/2026, 6:38:39 AM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.