gdown is a Google Drive public file/folder downloader. Versions prior to 5.2.2 are vulnerable to a Path Traversal attack within the extractall functionality. When extracting a maliciously crafted ZIP or TAR archive, the library fails to sanitize or validate the filenames of the archive members. This allow files to be written outside the intended destination directory, potentially leading to arbitrary file overwrite and Remote Code Execution (RCE). Version 5.2.2 contains a fix.
Metrics
Affected Vendors & Products
References
History
Sat, 18 Apr 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | gdown is a Google Drive public file/folder downloader. Versions prior to 5.2.2 are vulnerable to a Path Traversal attack within the extractall functionality. When extracting a maliciously crafted ZIP or TAR archive, the library fails to sanitize or validate the filenames of the archive members. This allow files to be written outside the intended destination directory, potentially leading to arbitrary file overwrite and Remote Code Execution (RCE). Version 5.2.2 contains a fix. | |
| Title | gdown Affected by Arbitrary File Write via Path Traversal in gdown.extractall | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-18T01:36:47.659Z
Reserved: 2026-04-13T19:50:42.114Z
Link: CVE-2026-40491
No data.
Status : Received
Published: 2026-04-18T03:16:13.157
Modified: 2026-04-18T03:16:13.157
Link: CVE-2026-40491
No data.
OpenCVE Enrichment
Updated: 2026-04-18T08:45:41Z