Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-39847 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Emmett (Python Web Framework) has a **Path Traversal** flaw in its RSGI static handler. πŸ“‰ **Consequences**: Attackers can read files **outside** the intended asset directory.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE-22**: Improper Limitation of a Pathname to a Restricted Directory.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Vendor**: emmett-framework. 🏷️ **Product**: emmett. πŸ“… **Affected Versions**: **2.5.0** up to **2.8.1** (exclusive). ⚠️ Any version in this range is vulnerable. 🚫 Versions < 2.5.0 or >= 2.8.1 are safe.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Privileges**: No authentication required (PR:N). πŸ“‚ **Data Access**: Can read **arbitrary files** on the server. πŸ“„ **Impact**: High Confidentiality (C:H) - sensitive configs, keys, code exposed.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: **LOW**. 🌐 **Network**: Attackable remotely (AV:N). 🚫 **Auth**: No privileges needed (PR:N). πŸ‘€ **User Interaction**: None required (UI:N). 🎯 **Complexity**: Low (AC:L).…

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exploit**: **No**. The `pocs` field is empty. πŸ“œ **Reference**: Official advisory available at GitHub GHSA-pr46-2v3c-5356.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for **Emmett** framework usage in Python apps. πŸ“‚ **Test**: Try accessing static files with `../` sequences. πŸ› οΈ **Tooling**: Use DAST scanners targeting CWE-22.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes. πŸ“’ **Source**: Official GitHub Security Advisory (GHSA-pr46-2v3c-5356). πŸ”„ **Action**: Upgrade to **Emmett 2.8.2** or later. πŸ›‘οΈ This resolves the RSGI static handler path traversal issue. πŸ“¦

Q9What if no patch? (Workaround)

🚧 **Workaround**: If patching is delayed, **disable** the RSGI static file handler if not needed. πŸ›‘ **Restrict**: Ensure web server (Nginx/Apache) serves static files instead of the framework.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: **HIGH**. 🚨 **CVSS**: High severity (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H). ⏳ **Urgency**: Patch immediately. πŸ“‰ Risk of data breach is significant due to lack of auth requirement.…