Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3029: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Artifex Software Inc. *PyMuPDF* PyMuPDF

0
High
VulnerabilityCVE-2026-3029cvecve-2026-3029cwe-22
Published: Thu Mar 19 2026 (03/19/2026, 15:53:38 UTC)
Source: CVE Database V5
Vendor/Project: Artifex Software Inc. *PyMuPDF*
Product: PyMuPDF

Description

A path traversal and arbitrary file write vulnerability exist in the embedded get function in '_main_.py' in PyMuPDF version, 1.26.5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 19:13:32 UTC

Technical Analysis

CVE-2026-3029 identifies a path traversal and arbitrary file write vulnerability in PyMuPDF version 1.26.5, a Python binding for the MuPDF PDF rendering library developed by Artifex Software Inc. The vulnerability resides in the embedded get function within the _main_.py script, where insufficient validation of file path inputs allows attackers to traverse directories beyond intended boundaries (CWE-22). This improper limitation enables an attacker to write files arbitrarily on the host system, potentially overwriting critical files or placing malicious payloads. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score of 7.5 reflects a high severity primarily due to the impact on system availability (denial of service or system instability) rather than confidentiality or integrity. No known exploits have been reported in the wild yet, but the flaw's characteristics make it a prime candidate for exploitation once weaponized. The lack of a current patch necessitates immediate defensive measures to limit exposure. PyMuPDF is widely used in document processing, PDF rendering, and automation workflows, making this vulnerability relevant to many software environments that integrate this library.

Potential Impact

The primary impact of CVE-2026-3029 is the potential for attackers to perform arbitrary file writes on systems running PyMuPDF 1.26.5, which can lead to denial of service conditions or compromise of system stability. While confidentiality and integrity impacts are not directly indicated, the ability to overwrite files arbitrarily can indirectly lead to integrity violations if critical system or application files are replaced or corrupted. This could also facilitate further attacks such as privilege escalation or persistent malware installation if attackers manage to write executable code or scripts. Organizations relying on PyMuPDF for document processing, PDF rendering, or automation may face service disruptions or security breaches. The vulnerability's remote exploitability without authentication and user interaction increases the attack surface, making it a significant risk for exposed systems. The absence of known exploits in the wild currently limits immediate widespread impact, but the potential for future exploitation remains high.

Mitigation Recommendations

To mitigate CVE-2026-3029, organizations should first monitor and restrict file system permissions for applications using PyMuPDF to limit the ability of the process to write outside designated directories. Employ application whitelisting and integrity monitoring to detect unauthorized file modifications. Until an official patch is released by Artifex Software Inc., consider isolating PyMuPDF usage within sandboxed or containerized environments to contain potential exploitation. Review and sanitize all inputs that interact with the embedded get function or similar file access methods to prevent malicious path traversal strings. Implement network-level controls to restrict access to services or applications exposing PyMuPDF functionality remotely. Regularly audit logs for unusual file write activities and anomalous behavior related to document processing workflows. Stay updated with vendor advisories and apply patches promptly once available. Additionally, consider using alternative PDF processing libraries without this vulnerability if immediate patching is not feasible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
certcc
Date Reserved
2026-02-23T14:10:15.439Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69bc1fb1e32a4fbe5fd8213b

Added to database: 3/19/2026, 4:09:21 PM

Last enriched: 3/26/2026, 7:13:32 PM

Last updated: 5/1/2026, 3:52:19 PM

Views: 134

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses