CVE-2026-39847

Source
https://cve.org/CVERecord?id=CVE-2026-39847
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-39847.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-39847
Aliases
Published
2026-04-07T21:37:54.760Z
Modified
2026-04-09T11:46:38.724532Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
Summary
Emmett has a path traversal in internal assets handler
Details

Emmett is a full-stack Python web framework designed with simplicity. From 2.5.0 to before 2.8.1, the RSGI static handler for Emmett's internal assets (/emmett paths) is vulnerable to path traversal attacks. An attacker can use ../ sequences (eg /emmett/../rsgi/handlers.py) to read arbitrary files outside the assets directory. This vulnerability is fixed in 2.8.1.

Database specific
{
    "cwe_ids": [
        "CWE-22"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/39xxx/CVE-2026-39847.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/emmett-framework/emmett

Affected ranges

Type
GIT
Repo
https://github.com/emmett-framework/emmett
Events
Database specific
{
    "versions": [
        {
            "introduced": "2.5.0"
        },
        {
            "fixed": "2.8.1"
        }
    ]
}

Affected versions

v2.*
v2.5.0
v2.5.1
v2.5.10
v2.5.11
v2.5.12
v2.5.13
v2.5.2
v2.5.3
v2.5.4
v2.5.5
v2.5.6
v2.5.7
v2.5.8
v2.5.9
v2.6.0
v2.6.1
v2.6.2
v2.6.3
v2.7.0
v2.7.1
v2.8.0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-39847.json"