CVE-2026-24009

Source
https://cve.org/CVERecord?id=CVE-2026-24009
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-24009.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-24009
Aliases
Related
Published
2026-01-22T15:04:52.745Z
Modified
2026-02-04T02:21:57.459303Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Docling Core vulnerable to Remote Code Execution via unsafe PyYAML usage
Details

Docling Core (or docling-core) is a library that defines core data types and transformations in the document processing application Docling. A PyYAML-related Remote Code Execution (RCE) vulnerability, namely CVE-2020-14343, is exposed in docling-core starting in version 2.21.0 and prior to version 2.48.4, specifically only if the application uses pyyaml prior to version 5.4 and invokes docling_core.types.doc.DoclingDocument.load_from_yaml() passing it untrusted YAML data. The vulnerability has been patched in docling-core version 2.48.4. The fix mitigates the issue by switching PyYAML deserialization from yaml.FullLoader to yaml.SafeLoader, ensuring that untrusted data cannot trigger code execution. Users who cannot immediately upgrade docling-core can alternatively ensure that the installed version of PyYAML is 5.4 or greater.

Database specific
{
    "cwe_ids": [
        "CWE-502"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/24xxx/CVE-2026-24009.json"
}
References

Affected packages

Git / github.com/docling-project/docling-core

Affected ranges

Type
GIT
Repo
https://github.com/docling-project/docling-core
Events

Affected versions

v2.*
v2.21.0
v2.21.1
v2.21.2
v2.22.0
v2.23.0
v2.23.1
v2.23.2
v2.23.3
v2.24.0
v2.24.1
v2.25.0
v2.26.0
v2.26.1
v2.26.2
v2.26.3
v2.26.4
v2.27.0
v2.28.0
v2.28.1
v2.29.0
v2.30.0
v2.30.1
v2.31.0
v2.31.1
v2.31.2
v2.32.0
v2.33.0
v2.33.1
v2.34.0
v2.34.1
v2.34.2
v2.35.0
v2.36.0
v2.37.0
v2.38.0
v2.38.1
v2.38.2
v2.39.0
v2.40.0
v2.41.0
v2.42.0
v2.43.0
v2.43.1
v2.44.0
v2.44.1
v2.44.2
v2.45.0
v2.46.0
v2.47.0
v2.48.0
v2.48.1
v2.48.2
v2.48.3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-24009.json"