CVE-2026-33320 PUBLISHED

Dasel has unbounded YAML alias expansion in dasel leads to CPU/memory denial of service

Assigner: GitHub_M
Reserved: 18.03.2026 Published: 24.03.2026 Updated: 24.03.2026

Dasel is a command-line tool and library for querying, modifying, and transforming data structures. Starting in version 3.0.0 and prior to version 3.3.1, Dasel's YAML reader allows an attacker who can supply YAML for processing to trigger extreme CPU and memory consumption. The issue is in the library's own UnmarshalYAML implementation, which manually resolves alias nodes by recursively following yaml.Node.Alias pointers without any expansion budget, bypassing go-yaml v4's built-in alias expansion limit. Version 3.3.2 contains a patch for the issue.

Metrics

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS Score: 6.2

Product Status

Vendor TomWright
Product dasel
Versions
  • Version >= 3.0.0, < 3.3.2 is affected

References

Problem Types

  • CWE-674: Uncontrolled Recursion CWE