Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3479: Vulnerability in Python Software Foundation CPython

0
Low
VulnerabilityCVE-2026-3479cvecve-2026-3479
Published: Wed Mar 18 2026 (03/18/2026, 18:13:42 UTC)
Source: CVE Database V5
Vendor/Project: Python Software Foundation
Product: CPython

Description

pkgutil.get_data() did not validate the resource argument as documented, allowing path traversals.

AI-Powered Analysis

AILast updated: 03/18/2026, 18:57:52 UTC

Technical Analysis

CVE-2026-3479 identifies a vulnerability in the Python Software Foundation's CPython implementation, specifically in the pkgutil.get_data() function. This function is designed to retrieve resource data from Python packages, but it does not properly validate the resource argument as documented, which allows path traversal attacks. Path traversal vulnerabilities occur when an attacker can manipulate file paths to access files outside the intended directory, potentially exposing sensitive data. In this case, an attacker with local access could exploit this flaw to read arbitrary files by crafting malicious resource paths passed to pkgutil.get_data(). The vulnerability has a CVSS 4.0 base score of 2.1, reflecting low severity due to limited attack vector (local access required), no authentication needed, no user interaction, and minimal impact on confidentiality and integrity. The vulnerability does not affect availability and does not escalate privileges. No known exploits have been reported in the wild, and no official patches or mitigations have been published at the time of disclosure. The affected versions are not explicitly detailed beyond '0', which likely indicates early or all versions prior to a fix. This vulnerability is relevant primarily to developers and environments where Python packages are accessed locally, especially in development or testing scenarios. It highlights the importance of input validation in resource handling functions within widely used programming language runtimes.

Potential Impact

The potential impact of CVE-2026-3479 is relatively limited due to its low severity and requirement for local access. An attacker who already has local access to a system running a vulnerable CPython version could exploit the path traversal flaw to read arbitrary files accessible to the Python process. This could lead to exposure of sensitive configuration files, credentials, or source code, potentially aiding further attacks. However, since remote exploitation is not feasible and no privilege escalation occurs, the overall risk to organizations is low. The vulnerability could affect development environments, continuous integration pipelines, or local testing setups where untrusted users have access. In production environments where Python is used primarily for server-side code execution without local user access, the risk is minimal. Nonetheless, organizations relying heavily on Python for automation, scripting, or application development should consider this vulnerability in their security assessments to prevent information disclosure risks.

Mitigation Recommendations

To mitigate CVE-2026-3479, organizations should implement the following specific measures: 1) Restrict local access to systems running vulnerable CPython versions to trusted users only, minimizing the risk of local exploitation. 2) Review and audit any code that uses pkgutil.get_data() to ensure that resource arguments are properly validated and sanitized before use, preventing path traversal attempts. 3) Employ filesystem permissions and access controls to limit the Python process's ability to read sensitive files that could be exposed via path traversal. 4) Monitor Python Software Foundation announcements and update CPython to patched versions promptly once available. 5) In environments where patching is delayed, consider using application-level sandboxing or containerization to isolate Python processes and reduce the impact of potential exploits. 6) Incorporate static and dynamic code analysis tools to detect unsafe resource handling patterns in Python codebases. These targeted actions go beyond generic advice by focusing on local access control, input validation, and environment hardening specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
PSF
Date Reserved
2026-03-03T14:18:35.394Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69baf24a771bdb1749bb3c5f

Added to database: 3/18/2026, 6:43:22 PM

Last enriched: 3/18/2026, 6:57:52 PM

Last updated: 3/18/2026, 7:50:14 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses