Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33320: CWE-674: Uncontrolled Recursion in TomWright dasel

0
Medium
VulnerabilityCVE-2026-33320cvecve-2026-33320cwe-674
Published: Tue Mar 24 2026 (03/24/2026, 00:06:22 UTC)
Source: CVE Database V5
Vendor/Project: TomWright
Product: dasel

Description

Dasel is a command-line tool and library for querying, modifying, and transforming data structures. Starting in version 3.0.0 and prior to version 3.3.1, Dasel's YAML reader allows an attacker who can supply YAML for processing to trigger extreme CPU and memory consumption. The issue is in the library's own `UnmarshalYAML` implementation, which manually resolves alias nodes by recursively following `yaml.Node.Alias` pointers without any expansion budget, bypassing go-yaml v4's built-in alias expansion limit. Version 3.3.2 contains a patch for the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 01:03:39 UTC

Technical Analysis

CVE-2026-33320 is a vulnerability identified in the dasel command-line tool and library, which is used for querying and modifying data structures including YAML. The vulnerability stems from the tool's custom YAML unmarshalling implementation, which manually resolves alias nodes by recursively following yaml.Node.Alias pointers without enforcing any expansion budget. This bypasses the built-in alias expansion limits of the underlying go-yaml v4 library. As a result, an attacker who can supply crafted YAML input can trigger uncontrolled recursion, leading to extreme CPU and memory consumption. This resource exhaustion can cause denial of service (DoS) conditions, impacting the availability of systems running dasel versions from 3.0.0 up to 3.3.1. The vulnerability does not compromise confidentiality or integrity, as it does not allow code execution or data manipulation beyond resource exhaustion. The flaw was addressed in dasel version 3.3.2 by implementing proper alias expansion limits to prevent infinite recursion. Exploitation requires the ability to provide YAML input to dasel, which may be local or through automated pipelines that use dasel for YAML processing. No authentication or user interaction is required, but the attack vector is limited to environments where dasel processes untrusted YAML data.

Potential Impact

The primary impact of CVE-2026-33320 is denial of service through resource exhaustion. Organizations using dasel in automated workflows, CI/CD pipelines, or configuration management that process untrusted or user-supplied YAML data are at risk of service disruption. This can lead to downtime, degraded performance, and potential cascading failures in dependent systems. Since dasel is a tool often integrated into DevOps and infrastructure automation, the vulnerability could disrupt development and deployment processes, delaying critical updates or releases. The vulnerability does not expose sensitive data or allow unauthorized changes, limiting its impact to availability. However, the ease of triggering resource exhaustion without authentication or user interaction makes it a significant operational risk. Organizations relying on dasel in security-sensitive or high-availability environments should prioritize patching to avoid potential outages.

Mitigation Recommendations

To mitigate CVE-2026-33320, organizations should upgrade dasel to version 3.3.2 or later, where the alias expansion limit has been properly implemented. Until upgrading, restrict the use of dasel to trusted YAML inputs only, avoiding processing untrusted or user-supplied YAML data. Implement input validation and sanitization to detect and block suspicious YAML alias structures that could trigger recursion. Monitor CPU and memory usage of systems running dasel to detect abnormal resource consumption indicative of exploitation attempts. Consider sandboxing dasel executions or running them with resource limits (e.g., cgroups or containers) to contain potential DoS effects. Review automation and CI/CD pipelines to ensure they do not expose dasel to untrusted inputs. Finally, maintain awareness of updates from the dasel project and apply patches promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-18T21:23:36.677Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c1debff4197a8e3babf872

Added to database: 3/24/2026, 12:45:51 AM

Last enriched: 3/24/2026, 1:03:39 AM

Last updated: 3/24/2026, 5:19:45 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses