Description
MarkUs is a web application for the submission and grading of student assignments. Prior to version 2.9.4, MarkUs allows course instructors to upload YAML files to create/update various entities (e.g., assignment settings). These YAML files are parsed with aliases enabled. This issue has been patched in version 2.9.4.
Published: 2026-03-06
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via YAML alias expansion
Action: Patch immediately
AI Analysis

Impact

MarkUs is a web application used for student assignment submission and grading. In versions prior to 2.9.4, it permits course instructors to upload YAML files that are parsed with alias support enabled. An attacker can craft a YAML document that employs the ‘billion laughs’ alias technique to cause the parser to recursively expand aliases, creating an exponentially large data structure that exhausts server memory and CPU resources. The result is a denial of service that can render the web application unresponsive or force it to crash, directly impacting assignment management and potentially delaying grading procedures.

Affected Systems

The vulnerability affects all installations of the MarkUsProject:Markus application using a version earlier than 2.9.4. Any deployment that allows instructors to upload configuration YAML files is subject to this issue until the patch is applied in version 2.9.4 or any later release.

Risk and Exploitability

The CVSS base score of 4.9 indicates a medium severity. The EPSS score of less than 1% suggests a low likelihood of real‑world exploitation, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that exploitation requires authenticated access to the instructor file‑upload endpoint, so the likely attack vector is an authenticated remote attacker who holds instructor privileges. By uploading a malicious YAML file that triggers alias expansion, the attacker would consume server resources and cause a denial of service.

Generated by OpenCVE AI on April 18, 2026 at 09:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade MarkUs to version 2.9.4 or newer to apply the vendor patch
  • Restrict the YAML upload endpoint so that only verified instructor accounts can access it and enforce strict authentication checks
  • Configure the application or web server to impose file size limits and validate YAML content before parsing to mitigate large or complex payloads

Generated by OpenCVE AI on April 18, 2026 at 09:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:markusproject:markus:*:*:*:*:*:*:*:*

Fri, 06 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Markusproject
Markusproject markus
Vendors & Products Markusproject
Markusproject markus

Fri, 06 Mar 2026 03:30:00 +0000

Type Values Removed Values Added
Description MarkUs is a web application for the submission and grading of student assignments. Prior to version 2.9.4, MarkUs allows course instructors to upload YAML files to create/update various entities (e.g., assignment settings). These YAML files are parsed with aliases enabled. This issue has been patched in version 2.9.4.
Title MarkUs: YAML alias (‘billion laughs’) DoS in config upload
Weaknesses CWE-776
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Markusproject Markus
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-06T16:10:43.887Z

Reserved: 2026-02-24T02:31:33.267Z

Link: CVE-2026-27807

cve-icon Vulnrichment

Updated: 2026-03-06T15:50:50.844Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-06T04:16:07.810

Modified: 2026-03-12T17:22:20.530

Link: CVE-2026-27807

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T10:00:10Z

Weaknesses