eml_parser serves as a python module for parsing eml files and returning various information found in the e-mail as well as computed information. Prior to version 2.0.1, the official example script examples/recursively_extract_attachments.py contains a path traversal vulnerability that allows arbitrary file write outside the intended output directory. Attachment filenames extracted from parsed emails are directly used to construct output file paths without any sanitization, allowing an attacker-controlled filename to escape the target directory. This issue has been patched in version 2.0.1.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-389r-rccm-h3h5 eml_parser: Path Traversal in Official Example Script Leads to Arbitrary File Write
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 07 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
Description eml_parser serves as a python module for parsing eml files and returning various information found in the e-mail as well as computed information. Prior to version 2.0.1, the official example script examples/recursively_extract_attachments.py contains a path traversal vulnerability that allows arbitrary file write outside the intended output directory. Attachment filenames extracted from parsed emails are directly used to construct output file paths without any sanitization, allowing an attacker-controlled filename to escape the target directory. This issue has been patched in version 2.0.1.
Title eml_parser: Path Traversal in Official Example Script Leading to Arbitrary File Write
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-07T15:22:43.645Z

Reserved: 2026-03-04T16:26:02.898Z

Link: CVE-2026-29780

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-07T16:15:55.113

Modified: 2026-03-07T16:15:55.113

Link: CVE-2026-29780

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses