Docling-Project Docling-Core vulnerabilities
2 known vulnerabilities affecting docling-project/docling-core.
Total CVEs
2
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2
Vulnerabilities
Page 1 of 1
CVE-2026-24009CRITICALCVSS 9.8≥ 2.21.0, < 2.48.42026-01-22
CVE-2026-24009 [CRITICAL] CWE-502 docling-core vulnerable to Remote Code Execution via unsafe PyYAML usage
docling-core vulnerable to Remote Code Execution via unsafe PyYAML usage
### Impact
A PyYAML-related Remote Code Execution (RCE) vulnerability, namely CVE-2020-14343, is exposed in `docling-core >=2.21.0, <2.48.4` and, specifically only if the application uses `pyyaml < 5.4` and invokes `docling_core.types.doc.DoclingDocument.load_from_yaml()` passing it untrusted YAML data.
### Patches
ghsaosv
CVE-2020-14343CRITICALCVSS 9.8v>= 2.21.0, < 2.48.42021-02-09
CVE-2020-14343 [CRITICAL] CWE-20 CVE-2020-14343: A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible
A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker
nvd