CVE-2026-29780
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to write files to any location on the server by exploiting a flaw in how the eml_parser handles attachment filenames, potentially leading to unauthorized access or data loss. It occurs when the script processes emails with specially crafted attachment names, and it has been fixed in version 2.0.1.
Technical Description
eml_parser serves as a python module for parsing eml files and returning various information found in the e-mail as well as computed information. Prior to version 2.0.1, the official example script examples/recursively_extract_attachments.py contains a path traversal vulnerability that allows arbitrary file write outside the intended output directory. Attachment filenames extracted from parsed emails are directly used to construct output file paths without any sanitization, allowing an attacker-controlled filename to escape the target directory. This issue has been patched in version 2.0.1.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 7, 2026
about 1 month ago
Last Modified
Mar 11, 2026
27 days ago
Vendor
govcert.lu
Product
eml parser