nltk CVE Vulnerabilities & Metrics

Focus on nltk vulnerabilities and metrics.

Last updated: 08 Mar 2026, 23:25 UTC

About nltk Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with nltk. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total nltk CVEs: 5
Earliest CVE date: 22 Aug 2019, 16:15 UTC
Latest CVE date: 18 Feb 2026, 18:24 UTC

Latest CVE reference: CVE-2025-14009

Rolling Stats

30-day Count (Rolling): 1
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical nltk CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.0

Max CVSS: 5.0

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 1
4.0-6.9 4
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS nltk CVEs

These are the five CVEs with the highest CVSS scores for nltk, sorted by severity first and recency.

All CVEs for nltk

CVE-2025-14009 nltk vulnerability CVSS: 0 18 Feb 2026, 18:24 UTC

A critical vulnerability exists in the NLTK downloader component of nltk/nltk, affecting all versions. The _unzip_iter function in nltk/downloader.py uses zipfile.extractall() without performing path validation or security checks. This allows attackers to craft malicious zip packages that, when downloaded and extracted by NLTK, can execute arbitrary code. The vulnerability arises because NLTK assumes all downloaded packages are trusted and extracts them without validation. If a malicious package contains Python files, such as __init__.py, these files are executed automatically upon import, leading to remote code execution. This issue can result in full system compromise, including file system access, network access, and potential persistence mechanisms.

CVE-2021-3842 nltk vulnerability CVSS: 5.0 04 Jan 2022, 15:15 UTC

nltk is vulnerable to Inefficient Regular Expression Complexity

CVE-2021-43854 nltk vulnerability CVSS: 5.0 23 Dec 2021, 18:15 UTC

NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. Versions prior to 3.6.5 are vulnerable to regular expression denial of service (ReDoS) attacks. The vulnerability is present in PunktSentenceTokenizer, sent_tokenize and word_tokenize. Any users of this class, or these two functions, are vulnerable to the ReDoS attack. In short, a specifically crafted long input to any of these vulnerable functions will cause them to take a significant amount of execution time. If your program relies on any of the vulnerable functions for tokenizing unpredictable user input, then we would strongly recommend upgrading to a version of NLTK without the vulnerability. For users unable to upgrade the execution time can be bounded by limiting the maximum length of an input to any of the vulnerable functions. Our recommendation is to implement such a limit.

CVE-2021-3828 nltk vulnerability CVSS: 5.0 27 Sep 2021, 13:15 UTC

nltk is vulnerable to Inefficient Regular Expression Complexity

CVE-2019-14751 nltk vulnerability CVSS: 5.0 22 Aug 2019, 16:15 UTC

NLTK Downloader before 3.4.5 is vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in an NLTK package (ZIP archive) that is mishandled during extraction.