CVE-2026-33532Uncontrolled Recursion in Yaml

Severity
4.3MEDIUMNVD
EPSS
0.1%
top 83.36%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 26

Description

`yaml` is a YAML parser and serialiser for JavaScript. Parsing a YAML document with a version of `yaml` on the 1.x branch prior to 1.10.3 or on the 2.x branch prior to 2.8.3 may throw a RangeError due to a stack overflow. The node resolution/composition phase uses recursive function calls without a depth bound. An attacker who can supply YAML for parsing can trigger a `RangeError: Maximum call stack size exceeded` with a small payload (~2–10 KB). The `RangeError` is not a `YAMLParseError`, so ap

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:LExploitability: 2.8 | Impact: 1.4

Affected Packages4 packages

debiandebian/node-yaml< node-yaml 2.8.3+~cs0.4.0-1 (forky)
NVDeemeli/yaml1.0.01.10.3+1
npmyaml_project/yaml2.0.02.8.3+1
CVEListV5eemeli/yaml>= 1.0.0, < 1.10.3, >= 2.0.0, < 2.8.3+1

Patches

🔴Vulnerability Details

3
OSV
CVE-2026-33532: `yaml` is a YAML parser and serialiser for JavaScript2026-03-26
OSV
yaml is vulnerable to Stack Overflow via deeply nested YAML collections2026-03-25
GHSA
yaml is vulnerable to Stack Overflow via deeply nested YAML collections2026-03-25

📋Vendor Advisories

2
Red Hat
yaml: yaml: Denial of Service via deeply nested YAML document parsing2026-03-26
Debian
CVE-2026-33532: node-yaml - `yaml` is a YAML parser and serialiser for JavaScript. Parsing a YAML document w...2026

🕵️Threat Intelligence

2
Wiz
CVE-2026-33532 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2025-10990 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-33532 — Uncontrolled Recursion in Eemeli Yaml | cvebase