HomeIntelligenceBrief
VULNERABILITY BRIEF🟠 High Vulnerability

Path Traversal in python‑multipart 0.0.22 (CVE‑2026‑24486) Enables Arbitrary File Write in Web Apps

A newly disclosed path‑traversal flaw (CVE‑2026‑24486) in python‑multipart < 0.0.22 allows attackers to write files anywhere on the server when UPLOAD_KEEP_FILENAME=True. The issue affects Python‑based SaaS and API services, creating a high‑risk supply‑chain vector for third‑party risk managers.

LiveThreat™ Intelligence · 📅 April 30, 2026· 📰 exploit-db.com
🟠
Severity
High
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
exploit-db.com

Python‑Multipart 0.0.22 Path‑Traversal Enables Arbitrary File Write in Web Applications

What Happened — A newly disclosed CVE‑2026‑24486 reveals a path‑traversal flaw in the python‑multipart library (versions < 0.0.22). When the library is configured with UPLOAD_KEEP_FILENAME=True and a custom UPLOAD_DIR, an attacker can supply a crafted filename (e.g., ../../etc/passwd%00.txt) that causes the server to write the uploaded file to any location on the filesystem, including privileged paths. A public PoC demonstrates writing to /etc/hosts, the web root, and even creating a PHP web‑shell.

Why It Matters for TPRM

  • The library is widely used in Python‑based SaaS, API gateways, and internal web portals; a vulnerable third‑party component can expose your data or compromise your environment.
  • Arbitrary file write can lead to credential theft, ransomware staging, or full server takeover, amplifying supply‑chain risk.
  • The vulnerability is exploitable without authentication, making it a high‑impact vector for external attackers.

Who Is Affected — Technology & SaaS providers, cloud‑hosted web applications, API services, and any organization that ships Python‑based web services using python‑multipart < 0.0.22.

Recommended Actions

  • Immediately upgrade to python‑multipart>=0.0.22 (or later).
  • Disable UPLOAD_KEEP_FILENAME or enforce strict filename sanitisation (os.path.basename).
  • Review all third‑party dependency inventories for the vulnerable version and apply patches across development, staging, and production environments.

Technical Notes — Attack vector: crafted multipart request with malicious filename; CVE‑2026‑24486; affects Python 3.13+ environments; enables arbitrary file write, leading to potential remote code execution. Source: https://www.exploit-db.com/exploits/52543

📰 Original Source
https://www.exploit-db.com/exploits/52543

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.