Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33320: CWE-674: Uncontrolled Recursion in TomWright dasel

0
Medium
VulnerabilityCVE-2026-33320cvecve-2026-33320cwe-674
Published: Tue Mar 24 2026 (03/24/2026, 00:06:22 UTC)
Source: CVE Database V5
Vendor/Project: TomWright
Product: dasel

Description

Dasel is a command-line tool and library for querying, modifying, and transforming data structures. Starting in version 3.0.0 and prior to version 3.3.1, Dasel's YAML reader allows an attacker who can supply YAML for processing to trigger extreme CPU and memory consumption. The issue is in the library's own `UnmarshalYAML` implementation, which manually resolves alias nodes by recursively following `yaml.Node.Alias` pointers without any expansion budget, bypassing go-yaml v4's built-in alias expansion limit. Version 3.3.2 contains a patch for the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 20:03:25 UTC

Technical Analysis

Dasel is a command-line tool and library designed for querying, modifying, and transforming data structures, supporting formats like YAML. Starting from version 3.0.0 up to but not including 3.3.2, dasel's YAML reader contains a vulnerability (CVE-2026-33320) due to uncontrolled recursion in its UnmarshalYAML function. Specifically, dasel manually resolves YAML alias nodes by recursively following yaml.Node.Alias pointers without enforcing any expansion limits. This bypasses the built-in alias expansion limit of the underlying go-yaml v4 library, which is designed to prevent resource exhaustion attacks. An attacker who can supply malicious YAML input to dasel can trigger extreme CPU and memory consumption, effectively causing a denial of service (DoS). The vulnerability does not impact confidentiality or integrity but severely affects availability. Exploitation requires the ability to provide YAML input to dasel, which is typically local or within trusted automation pipelines. The issue was addressed in dasel version 3.3.2 by implementing proper alias expansion limits to prevent uncontrolled recursion. No known exploits have been reported in the wild as of the publication date. The CVSS v3.1 base score is 6.2, reflecting a medium severity with attack vector local, low attack complexity, no privileges required, and no user interaction needed.

Potential Impact

The primary impact of CVE-2026-33320 is denial of service through resource exhaustion. Organizations using dasel to process YAML data, especially in automated DevOps pipelines, CI/CD workflows, or configuration management systems, may experience service disruptions if an attacker supplies crafted YAML input. This can lead to system instability, degraded performance, or crashes, potentially affecting critical automation tasks. Since dasel is often integrated into development and deployment environments, the disruption could delay software releases or configuration updates. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can have cascading effects on operational continuity. The lack of required privileges or user interaction lowers the barrier for exploitation in environments where untrusted YAML input is processed. However, the attack vector is local or limited to contexts where YAML input can be controlled, reducing the overall attack surface. No widespread exploitation is currently known, but the risk remains for organizations relying on vulnerable dasel versions.

Mitigation Recommendations

To mitigate CVE-2026-33320, organizations should upgrade dasel to version 3.3.2 or later, where the uncontrolled recursion issue has been patched. For environments where immediate upgrade is not feasible, implement input validation and sanitization to restrict or reject untrusted YAML inputs containing alias nodes. Limit the use of dasel to trusted data sources and avoid processing YAML from unverified or external origins. Monitor resource usage of processes invoking dasel to detect abnormal CPU or memory consumption indicative of exploitation attempts. Incorporate rate limiting or sandboxing techniques to isolate dasel executions and prevent system-wide impact. Additionally, review automation workflows to ensure YAML inputs are controlled and consider adding static analysis or scanning tools to detect potentially malicious YAML structures. Maintain awareness of updates from the dasel project and apply security patches promptly. Finally, document and train development and operations teams about this vulnerability to reduce inadvertent exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-18T21:23:36.677Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c1debff4197a8e3babf872

Added to database: 3/24/2026, 12:45:51 AM

Last enriched: 3/31/2026, 8:03:25 PM

Last updated: 5/7/2026, 6:49:17 PM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses