CVE-2026-3479 β DISPUTED: The project has clarified that the documentation was incorrect, andβ¦
Image via opengraph.githubassets.com
π¨ CVE-2026-3479 DISPUTED: The project has clarified that the documentation was incorrect, and that pkgutil.getdata() has the same security model as open(). The documentation has been updated to clarify this point. There is no vulnerability in the function if following the intended security model. p
[3.13] gh-146121: Clarify security model of pkgutil.getdata; revert c⦠· python/cpython@5af6ce3
github.com
What This Means For You
- New vulnerability disclosed β verify if your stack is exposed.
Related ATT&CK Techniques
π‘οΈ Detection Rules
1 rule Β· 6 SIEM formats1 detection rule mapped to MITRE ATT&CK. Free Sigma YAML below.
Web Application Exploitation Attempt β CVE-2026-3479
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-3479 | Path Traversal | Python pkgutil.get_data() function did not validate the resource argument as documented, allowing path traversals. Affected component: pkgutil.get_data(). |
Source & Attribution
| Source Platform | Telegram |
| Channel | CVE Notify |
| Published | April 07, 2026 at 21:26 UTC |
This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.
Believe this infringes your rights? Submit a takedown request.