Changeflow GovPing Data Privacy & Cybersecurity Python Path Traversal Vulnerability Disclosed
Priority review Notice Added Final

Python Path Traversal Vulnerability Disclosed

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 18th, 2026
Detected March 19th, 2026
Email

Summary

CERT-Bund has disclosed a path traversal vulnerability in Python versions prior to 3.15.0. The vulnerability, with a CVSS base score of 4.0, allows local attackers to exploit the flaw. Mitigation is available.

What changed

CERT-Bund has issued a security advisory (WID-SEC-2026-0791) detailing a path traversal vulnerability affecting Open Source Python CPython versions prior to 3.15.0. The vulnerability, rated with a CVSS base score of 4.0 (medium), can be exploited by a local attacker. The advisory indicates that mitigation measures are available.

Organizations utilizing Python versions prior to 3.15.0, particularly those running on Linux, MacOS X, UNIX, or Windows, should review the advisory and implement available mitigations to address the path traversal risk. While the vulnerability requires local access, it could be a component of a larger attack chain. Further information and specific CVE details are referenced in the advisory.

What to do next

  1. Review CERT-Bund advisory WID-SEC-2026-0791 for affected Python versions.
  2. Implement available mitigation measures for path traversal vulnerabilities.
  3. Assess potential impact on systems running vulnerable Python versions.

Source document (simplified)

[WID-SEC-2026-0791] Python: Schwachstelle ermöglicht Path Traversal CVSS Base Score 4.0 (mittel) CVSS Temporal Score 3.5 (niedrig) Remoteangriff nein Datum 18.03.2026 Stand 19.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • MacOS X
  • Sonstiges
  • UNIX
  • Windows

Produktbeschreibung

Python ist eine universelle, üblicherweise interpretierte, höhere Programmiersprache.

Produkte

18.03.2026
- Open Source Python CPython <3.15.0

Angriff

Angriff

Ein lokaler Angreifer kann eine Schwachstelle in Python ausnutzen, um einen Path-Traversal Angriff durchzuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Named provisions

Betroffene Systeme Angriff

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 18th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-0791

Who this affects

Applies to
Technology companies
Industry sector
5112 Software & Technology
Activity scope
Software Development System Administration
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Software Vulnerabilities Information Security

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.