CVE-2026-33320: CWE-674: Uncontrolled Recursion in TomWright dasel
Dasel is a command-line tool and library for querying, modifying, and transforming data structures. Starting in version 3.0.0 and prior to version 3.3.1, Dasel's YAML reader allows an attacker who can supply YAML for processing to trigger extreme CPU and memory consumption. The issue is in the library's own `UnmarshalYAML` implementation, which manually resolves alias nodes by recursively following `yaml.Node.Alias` pointers without any expansion budget, bypassing go-yaml v4's built-in alias expansion limit. Version 3.3.2 contains a patch for the issue.
AI Analysis
Technical Summary
Dasel is a command-line tool and library designed for querying, modifying, and transforming data structures, supporting formats like YAML. Starting from version 3.0.0 up to but not including 3.3.2, dasel's YAML reader contains a vulnerability (CVE-2026-33320) due to uncontrolled recursion in its UnmarshalYAML function. Specifically, dasel manually resolves YAML alias nodes by recursively following yaml.Node.Alias pointers without enforcing any expansion limits. This bypasses the built-in alias expansion limit of the underlying go-yaml v4 library, which is designed to prevent resource exhaustion attacks. An attacker who can supply malicious YAML input to dasel can trigger extreme CPU and memory consumption, effectively causing a denial of service (DoS). The vulnerability does not impact confidentiality or integrity but severely affects availability. Exploitation requires the ability to provide YAML input to dasel, which is typically local or within trusted automation pipelines. The issue was addressed in dasel version 3.3.2 by implementing proper alias expansion limits to prevent uncontrolled recursion. No known exploits have been reported in the wild as of the publication date. The CVSS v3.1 base score is 6.2, reflecting a medium severity with attack vector local, low attack complexity, no privileges required, and no user interaction needed.
Potential Impact
The primary impact of CVE-2026-33320 is denial of service through resource exhaustion. Organizations using dasel to process YAML data, especially in automated DevOps pipelines, CI/CD workflows, or configuration management systems, may experience service disruptions if an attacker supplies crafted YAML input. This can lead to system instability, degraded performance, or crashes, potentially affecting critical automation tasks. Since dasel is often integrated into development and deployment environments, the disruption could delay software releases or configuration updates. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can have cascading effects on operational continuity. The lack of required privileges or user interaction lowers the barrier for exploitation in environments where untrusted YAML input is processed. However, the attack vector is local or limited to contexts where YAML input can be controlled, reducing the overall attack surface. No widespread exploitation is currently known, but the risk remains for organizations relying on vulnerable dasel versions.
Mitigation Recommendations
To mitigate CVE-2026-33320, organizations should upgrade dasel to version 3.3.2 or later, where the uncontrolled recursion issue has been patched. For environments where immediate upgrade is not feasible, implement input validation and sanitization to restrict or reject untrusted YAML inputs containing alias nodes. Limit the use of dasel to trusted data sources and avoid processing YAML from unverified or external origins. Monitor resource usage of processes invoking dasel to detect abnormal CPU or memory consumption indicative of exploitation attempts. Incorporate rate limiting or sandboxing techniques to isolate dasel executions and prevent system-wide impact. Additionally, review automation workflows to ensure YAML inputs are controlled and consider adding static analysis or scanning tools to detect potentially malicious YAML structures. Maintain awareness of updates from the dasel project and apply security patches promptly. Finally, document and train development and operations teams about this vulnerability to reduce inadvertent exposure.
Affected Countries
United States, Germany, United Kingdom, Japan, Canada, Australia, India, France, Netherlands, South Korea
CVE-2026-33320: CWE-674: Uncontrolled Recursion in TomWright dasel
Description
Dasel is a command-line tool and library for querying, modifying, and transforming data structures. Starting in version 3.0.0 and prior to version 3.3.1, Dasel's YAML reader allows an attacker who can supply YAML for processing to trigger extreme CPU and memory consumption. The issue is in the library's own `UnmarshalYAML` implementation, which manually resolves alias nodes by recursively following `yaml.Node.Alias` pointers without any expansion budget, bypassing go-yaml v4's built-in alias expansion limit. Version 3.3.2 contains a patch for the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Dasel is a command-line tool and library designed for querying, modifying, and transforming data structures, supporting formats like YAML. Starting from version 3.0.0 up to but not including 3.3.2, dasel's YAML reader contains a vulnerability (CVE-2026-33320) due to uncontrolled recursion in its UnmarshalYAML function. Specifically, dasel manually resolves YAML alias nodes by recursively following yaml.Node.Alias pointers without enforcing any expansion limits. This bypasses the built-in alias expansion limit of the underlying go-yaml v4 library, which is designed to prevent resource exhaustion attacks. An attacker who can supply malicious YAML input to dasel can trigger extreme CPU and memory consumption, effectively causing a denial of service (DoS). The vulnerability does not impact confidentiality or integrity but severely affects availability. Exploitation requires the ability to provide YAML input to dasel, which is typically local or within trusted automation pipelines. The issue was addressed in dasel version 3.3.2 by implementing proper alias expansion limits to prevent uncontrolled recursion. No known exploits have been reported in the wild as of the publication date. The CVSS v3.1 base score is 6.2, reflecting a medium severity with attack vector local, low attack complexity, no privileges required, and no user interaction needed.
Potential Impact
The primary impact of CVE-2026-33320 is denial of service through resource exhaustion. Organizations using dasel to process YAML data, especially in automated DevOps pipelines, CI/CD workflows, or configuration management systems, may experience service disruptions if an attacker supplies crafted YAML input. This can lead to system instability, degraded performance, or crashes, potentially affecting critical automation tasks. Since dasel is often integrated into development and deployment environments, the disruption could delay software releases or configuration updates. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can have cascading effects on operational continuity. The lack of required privileges or user interaction lowers the barrier for exploitation in environments where untrusted YAML input is processed. However, the attack vector is local or limited to contexts where YAML input can be controlled, reducing the overall attack surface. No widespread exploitation is currently known, but the risk remains for organizations relying on vulnerable dasel versions.
Mitigation Recommendations
To mitigate CVE-2026-33320, organizations should upgrade dasel to version 3.3.2 or later, where the uncontrolled recursion issue has been patched. For environments where immediate upgrade is not feasible, implement input validation and sanitization to restrict or reject untrusted YAML inputs containing alias nodes. Limit the use of dasel to trusted data sources and avoid processing YAML from unverified or external origins. Monitor resource usage of processes invoking dasel to detect abnormal CPU or memory consumption indicative of exploitation attempts. Incorporate rate limiting or sandboxing techniques to isolate dasel executions and prevent system-wide impact. Additionally, review automation workflows to ensure YAML inputs are controlled and consider adding static analysis or scanning tools to detect potentially malicious YAML structures. Maintain awareness of updates from the dasel project and apply security patches promptly. Finally, document and train development and operations teams about this vulnerability to reduce inadvertent exposure.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-18T21:23:36.677Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c1debff4197a8e3babf872
Added to database: 3/24/2026, 12:45:51 AM
Last enriched: 3/31/2026, 8:03:25 PM
Last updated: 5/7/2026, 6:49:17 PM
Views: 73
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.