Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21452: CWE-400: Uncontrolled Resource Consumption in msgpack msgpack-java

0
High
VulnerabilityCVE-2026-21452cvecve-2026-21452cwe-400cwe-789
Published: Fri Jan 02 2026 (01/02/2026, 20:47:44 UTC)
Source: CVE Database V5
Vendor/Project: msgpack
Product: msgpack-java

Description

CVE-2026-21452 is a high-severity denial-of-service vulnerability in msgpack-java versions prior to 0. 9. 11. It arises from uncontrolled resource consumption during deserialization of maliciously crafted . msgpack files containing EXT32 objects with attacker-controlled payload lengths. The vulnerability allows remote attackers to cause JVM heap exhaustion and service crashes without requiring authentication or user interaction. This can disrupt applications that deserialize untrusted . msgpack files, such as model registries, inference services, and CI/CD pipelines. The exploit involves a small but valid . msgpack file that bypasses basic validation and triggers unbounded memory allocation.

AI-Powered Analysis

AILast updated: 01/09/2026, 21:24:22 UTC

Technical Analysis

CVE-2026-21452 is a denial-of-service vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) and CWE-789 (Uncontrolled Memory Allocation) affecting the MessagePack for Java (msgpack-java) serializer library prior to version 0.9.11. The vulnerability is triggered during the deserialization process of .msgpack files containing EXT32 extension objects. Although msgpack-java lazily parses extension headers, it trusts the declared payload length metadata when materializing extension data via the ExtensionValue.getData() method. An attacker can craft a syntactically valid .msgpack file with an EXT32 object specifying an excessively large payload length. When deserialized, the library attempts to allocate a byte array of this declared size without enforcing any upper bound, leading to unbounded heap memory allocation. This results in rapid JVM heap exhaustion, excessive garbage collection, or immediate termination with an OutOfMemoryError, causing denial of service. The attack requires no malformed bytes, no user interaction, and no privileges, making it remotely exploitable in environments that accept or fetch .msgpack artifacts, such as model registries, inference services, CI/CD pipelines, and cloud-based model hosting platforms. The malicious payload is extremely small yet valid, enabling it to evade basic validation and scanning mechanisms. The vulnerability is fixed in msgpack-java version 0.9.11.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of services that rely on msgpack-java for deserializing .msgpack files, particularly in AI/ML model management, cloud services, and automated deployment pipelines. Exploitation can lead to JVM crashes and service outages, potentially causing cascading failures in production environments. This can disrupt critical business operations, degrade customer experience, and incur financial losses. Organizations using vulnerable versions in cloud-hosted or on-premises inference services may face remote denial-of-service attacks without warning. The small size and validity of the malicious payload complicate detection and prevention, increasing the likelihood of successful exploitation. Given the growing adoption of AI/ML workflows and cloud-native architectures in Europe, the impact could be widespread, especially in sectors like finance, healthcare, and manufacturing that depend on continuous service availability and model inference.

Mitigation Recommendations

European organizations should immediately upgrade all msgpack-java dependencies to version 0.9.11 or later to eliminate this vulnerability. Additionally, implement strict input validation and filtering on all .msgpack files, especially those sourced externally or from untrusted origins. Employ runtime monitoring and JVM heap usage alerts to detect abnormal memory consumption patterns indicative of exploitation attempts. Integrate security scanning tools capable of analyzing .msgpack files for anomalous EXT32 payload lengths. Restrict network access and authentication for services that accept or fetch .msgpack artifacts to reduce exposure. Where feasible, sandbox or isolate deserialization processes to limit the impact of potential crashes. Finally, update incident response plans to include detection and mitigation steps for deserialization-based denial-of-service attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-29T03:00:29.277Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69583184db813ff03e011ba0

Added to database: 1/2/2026, 8:58:44 PM

Last enriched: 1/9/2026, 9:24:22 PM

Last updated: 2/7/2026, 12:01:03 AM

Views: 224

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats