Impact
The flaw in NLTK's nltk.app.wordnet_app permits an attacker to terminate the WordNet Browser HTTP server without authentication. A remote user can send a crafted GET request "/SHUTDOWN THE SERVER" and the server invokes os._exit(0), immediately terminating the process. Because the server is killed, service availability is lost, effectively a denial of service. The weakness is a missing authentication check around a server control operation (CWE‑306).
Affected Systems
NLTK version 3.9.3 and earlier includes the vulnerable wordnet_app. The vulnerability exists in the default server startup mode of the WordNet Browser HTTP application bundled with the NLTK library. Users relying on NLTK's WordNet Browser for research or production services should verify their NLTK installation and upgrade beyond 3.9.3.
Risk and Exploitability
The CVSS score is 7.5, indicating moderate to high severity. The EPSS score is below 1 %, suggesting limited exploit probability at present, and it is not listed in CISA’s KEV catalog. Attackers can exploit the issue remotely via a simple HTTP GET request without requiring any prior credentials, making the vector likely unauthenticated and network reachable. While the impact is confined to denial of service, it can disrupt research workflows or automated pipelines that depend on the local WordNet service.
OpenCVE Enrichment
Github GHSA