CVE-2026-24009 (CNNVD-202601-3810)

HIGH
中文标题:
Docling Core 代码问题漏洞
英文标题:
Docling Core vulnerable to Remote Code Execution via unsafe PyYAML usage
CVSS分数: 8.1
发布时间: 2026-01-22 15:04:52
漏洞类型: 代码问题
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v3
漏洞描述
中文描述:

Docling Core是Docling Project开源的一个Python库。 Docling Core 2.21.0版本至2.48.4之前版本存在代码问题漏洞,该漏洞源于PyYAML反序列化问题,可能导致远程代码执行。

英文描述:

Docling Core (or docling-core) is a library that defines core data types and transformations in the document processing application Docling. A PyYAML-related Remote Code Execution (RCE) vulnerability, namely CVE-2020-14343, is exposed in docling-core starting in version 2.21.0 and prior to version 2.48.4, specifically only if the application uses pyyaml prior to version 5.4 and invokes `docling_core.types.doc.DoclingDocument.load_from_yaml()` passing it untrusted YAML data. The vulnerability has been patched in docling-core version 2.48.4. The fix mitigates the issue by switching `PyYAML` deserialization from `yaml.FullLoader` to `yaml.SafeLoader`, ensuring that untrusted data cannot trigger code execution. Users who cannot immediately upgrade docling-core can alternatively ensure that the installed version of PyYAML is 5.4 or greater.

CWE类型:
CWE-502
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
docling-project docling-core >= 2.21.0, < 2.48.4 - - cpe:2.3:a:docling-project:docling-core:>=_2.21.0,_<_2.48.4:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
https://github.com/docling-project/docling-core/security/advisories/GHSA-vqxf-v2gg-x3hc x_refsource_CONFIRM
cve.org
访问
https://github.com/docling-project/docling-core/issues/482 x_refsource_MISC
cve.org
访问
https://github.com/docling-project/docling-core/commit/3e8d628eeeae50f0f8f239c8c7fea773d065d80c x_refsource_MISC
cve.org
访问
https://github.com/advisories/GHSA-8q59-q68h-6hv4 x_refsource_MISC
cve.org
访问
https://github.com/docling-project/docling-core/releases/tag/v2.48.4 x_refsource_MISC
cve.org
访问
CVSS评分详情
3.1 (cna)
HIGH
8.1
CVSS向量: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2026-01-22 15:04:52
修改时间:
2026-01-22 15:59:19
创建时间:
2026-01-23 06:00:13
更新时间:
2026-01-27 06:00:17
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2026-24009 2026-01-23 03:20:00 2026-01-22 22:00:13
NVD nvd_CVE-2026-24009 2026-01-23 02:00:05 2026-01-22 22:00:17
CNNVD cnnvd_CNNVD-202601-3810 2026-01-26 02:10:03 2026-01-25 18:11:58
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2026-01-26 02:11:58
vulnerability_type: 未提取 → 代码问题; cnnvd_id: 未提取 → CNNVD-202601-3810; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 代码问题
  • cnnvd_id: 未提取 -> CNNVD-202601-3810
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2026-01-23 06:00:17
data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • data_sources: ['cve'] -> ['cve', 'nvd']