Description
MarkUs is a web application for the submission and grading of student assignments. Prior to version 2.9.4, MarkUs currently extracts zip files without any size or entry-count limits. For example, instructors can upload a zip file to provide an assignment configuration; students can upload a zip file for an assignment submission and indicate its contents should be extracted. This issue has been patched in version 2.9.4.
Published: 2026-03-06
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

MarkUs, a web application for student assignment submission and grading, extracts uploaded zip files without imposing size or entry-count limits. An instructor or student can upload a specially crafted zip file (a zip bomb) that expands to a vast number of files or consumes excessive disk space when decompressed, leading to a resource exhaustion attack that can stall the system, deny service to legitimate users, and potentially disrupt grading workflows. The weakness is categorized as CWE-409, reflecting insufficient restriction of file extraction scope.

Affected Systems

The vulnerability affects installations of MarkUs prior to version 2.9.4. This includes any instance of the MarkUs project software where assignment configuration uploads or student submissions are processed through the zip extraction module. Affected deployments would be those running older releases of the application, typically found in academic institutions using MarkUs for course management.

Risk and Exploitability

The CVSS score of 6.5 indicates a medium severity with potential for significant impact on availability. The EPSS score is below 1%, suggesting exploit attempts are currently rare or undetected, but the vulnerability does not appear in the CISA KEV catalog. Because the malicious zip file can be uploaded through the user interface, the attack vector is likely local or remote (depending on access to the upload functionality). Exploitation requires only the ability to submit or configure an assignment, a capability typical for instructors or students, thereby making the threat relevant to a broad user base.

Generated by OpenCVE AI on April 17, 2026 at 12:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade MarkUs to version 2.9.4 or later, which implements limits on zip extraction size and entry count.
  • If an upgrade cannot be performed immediately, prevent untrusted zip uploads by disabling the upload functionality or restricting file size before the extraction step.
  • Implement system resource limits, such as setting disk quotas or using cgroup restrictions, to isolate the MarkUs process and protect against disk exhaustion.

Generated by OpenCVE AI on April 17, 2026 at 12:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:markusproject:markus:*:*:*:*:*:*:*:*

Fri, 06 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Markusproject
Markusproject markus
Vendors & Products Markusproject
Markusproject markus

Fri, 06 Mar 2026 03:30:00 +0000

Type Values Removed Values Added
Description MarkUs is a web application for the submission and grading of student assignments. Prior to version 2.9.4, MarkUs currently extracts zip files without any size or entry-count limits. For example, instructors can upload a zip file to provide an assignment configuration; students can upload a zip file for an assignment submission and indicate its contents should be extracted. This issue has been patched in version 2.9.4.
Title MarkUs: Zip bomb in config upload enables DoS
Weaknesses CWE-409
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Markusproject Markus
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-06T16:10:34.343Z

Reserved: 2026-02-09T17:13:54.066Z

Link: CVE-2026-25962

cve-icon Vulnrichment

Updated: 2026-03-06T15:50:48.781Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-06T04:16:07.620

Modified: 2026-03-12T17:23:52.910

Link: CVE-2026-25962

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T12:30:06Z

Weaknesses