CVE-2020-14343 — Improper Input Validation in Pyyaml
Severity
9.8CRITICALNVD
EPSS
13.7%
top 5.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 9
Latest updateJan 22
Description
A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages12 packages
Patches
🔴Vulnerability Details
5OSV▶
CVE-2020-14343: A vulnerability was discovered in the PyYAML library in versions before 5↗2021-02-09
📋Vendor Advisories
8🕵️Threat Intelligence
1📄Research Papers
1arXiv▶
VulnRepairEval: An Exploit-Based Evaluation Framework for Assessing Large Language Model Vulnerability Repair Capabilities↗2025-09-03
💬Community
4Bugzilla
▶
Bugzilla
▶