gdown is a Google Drive public file/folder downloader. Versions prior to 5.2.2 are vulnerable to a Path Traversal attack within the extractall functionality. When extracting a maliciously crafted ZIP or TAR archive, the library fails to sanitize or validate the filenames of the archive members. This allow files to be written outside the intended destination directory, potentially leading to arbitrary file overwrite and Remote Code Execution (RCE). Version 5.2.2 contains a fix.
Metrics
Affected Vendors & Products
References
History
Mon, 20 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wkentaro
Wkentaro gdown |
|
| Vendors & Products |
Wkentaro
Wkentaro gdown |
Sat, 18 Apr 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | gdown is a Google Drive public file/folder downloader. Versions prior to 5.2.2 are vulnerable to a Path Traversal attack within the extractall functionality. When extracting a maliciously crafted ZIP or TAR archive, the library fails to sanitize or validate the filenames of the archive members. This allow files to be written outside the intended destination directory, potentially leading to arbitrary file overwrite and Remote Code Execution (RCE). Version 5.2.2 contains a fix. | |
| Title | gdown Affected by Arbitrary File Write via Path Traversal in gdown.extractall | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-04-18T01:36:47.659Z
Updated: 2026-04-20T15:50:02.983Z
Reserved: 2026-04-13T19:50:42.114Z
Link: CVE-2026-40491
Updated: 2026-04-20T15:49:54.248Z
Status : Awaiting Analysis
Published: 2026-04-18T03:16:13.157
Modified: 2026-04-20T19:03:07.607
Link: CVE-2026-40491
No data.