| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-76hw-p97h-883f | gdown Affected by Arbitrary File Write via Path Traversal in gdown.extractall |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 01 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:wkentaro:gdown:*:*:*:*:*:*:*:* |
Mon, 20 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wkentaro
Wkentaro gdown |
|
| Vendors & Products |
Wkentaro
Wkentaro gdown |
Sat, 18 Apr 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | gdown is a Google Drive public file/folder downloader. Versions prior to 5.2.2 are vulnerable to a Path Traversal attack within the extractall functionality. When extracting a maliciously crafted ZIP or TAR archive, the library fails to sanitize or validate the filenames of the archive members. This allow files to be written outside the intended destination directory, potentially leading to arbitrary file overwrite and Remote Code Execution (RCE). Version 5.2.2 contains a fix. | |
| Title | gdown Affected by Arbitrary File Write via Path Traversal in gdown.extractall | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-20T15:50:02.983Z
Reserved: 2026-04-13T19:50:42.114Z
Link: CVE-2026-40491
Updated: 2026-04-20T15:49:54.248Z
Status : Analyzed
Published: 2026-04-18T03:16:13.157
Modified: 2026-05-01T18:24:32.940
Link: CVE-2026-40491
No data.
OpenCVE Enrichment
Updated: 2026-04-20T14:58:49Z
Github GHSA