Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-1471


SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.


Published

2022-12-01T11:15:10.553

Last Modified

2025-06-18T09:15:47.243

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.3 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-20
  • Type: Primary
    CWE-502

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application snakeyaml_project snakeyaml < 2.0 Yes

References