Description
Emmett is a full-stack Python web framework designed with simplicity. From 2.5.0 to before 2.8.1, the RSGI static handler for Emmett's internal assets (/__emmett__ paths) is vulnerable to path traversal attacks. An attacker can use ../ sequences (eg /__emmett__/../rsgi/handlers.py) to read arbitrary files outside the assets directory. This vulnerability is fixed in 2.8.1.
Published: 2026-04-07
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Data exposure
Action: Patch Immediately
AI Analysis

Impact

Emmett, a full‑stack Python web framework, implements an internal assets handler accessible via the /__emmett__/ path. From versions 2.5.0 up to (but excluding) 2.8.1, this handler is susceptible to path traversal, allowing an attacker to include ‘../’ sequences in the request URL to read files outside the intended assets directory. The vulnerability is a classic file‑system traversal flaw, corresponding to CWE‑22, and can lead to arbitrary file reading, potentially exposing configuration files, source code, or other sensitive data. The assessed CVSS score of 9.1 reflects the significant impact on confidentiality, with no known requirement for local or privileged execution.

Affected Systems

The affected product is the Emmett framework, versions between 2.5.0 and before 2.8.1. The flaw exists specifically in the RSGI static handler that serves internal assets under the /__emmett__/ paths. The issue was resolved in Emmett 2.8.1, so any installation still running an earlier release remains vulnerable.

Risk and Exploitability

With a CVSS score of 9.1, the vulnerability carries high severity. There is no EPSS score available, and the flaw is not listed in the CISA KEV catalog, but the path traversal can be exploited remotely by an unauthenticated attacker simply by constructing a crafted HTTP request to the vulnerable endpoint. Once the request is received, the server will resolve the traversal and return the requested file, making this a straightforward remote exploitation scenario.

Generated by OpenCVE AI on April 7, 2026 at 23:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Emmett to version 2.8.1 or newer
  • Disable or restrict access to the /__emmett__/ internal assets URL in production environments
  • Perform a quick audit of exposed files to ensure no sensitive data is accessible

Generated by OpenCVE AI on April 7, 2026 at 23:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-pr46-2v3c-5356 Emmett has a path traversal in internal assets handler
History

Thu, 16 Apr 2026 04:45:00 +0000

Type Values Removed Values Added
First Time appeared Emmett
Emmett emmett
CPEs cpe:2.3:a:emmett:emmett:*:*:*:*:*:*:*:*
Vendors & Products Emmett
Emmett emmett

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Emmett-framework
Emmett-framework core
Vendors & Products Emmett-framework
Emmett-framework core

Wed, 08 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 22:00:00 +0000

Type Values Removed Values Added
Description Emmett is a full-stack Python web framework designed with simplicity. From 2.5.0 to before 2.8.1, the RSGI static handler for Emmett's internal assets (/__emmett__ paths) is vulnerable to path traversal attacks. An attacker can use ../ sequences (eg /__emmett__/../rsgi/handlers.py) to read arbitrary files outside the assets directory. This vulnerability is fixed in 2.8.1.
Title Emmett has a path traversal in internal assets handler
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}


Subscriptions

Emmett Emmett
Emmett-framework Core
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-08T15:35:40.853Z

Reserved: 2026-04-07T19:13:20.378Z

Link: CVE-2026-39847

cve-icon Vulnrichment

Updated: 2026-04-08T15:33:46.937Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T22:16:23.793

Modified: 2026-04-16T04:31:28.903

Link: CVE-2026-39847

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:23:00Z

Weaknesses