Description
DeepDiff is a project focused on Deep Difference and search of any Python data. From version 5.0.0 to before version 8.6.2, the pickle unpickler _RestrictedUnpickler validates which classes can be loaded but does not limit their constructor arguments. A few of the types in SAFE_TO_IMPORT have constructors that allocate memory proportional to their input (builtins.bytes, builtins.list, builtins.range). A 40-byte pickle payload can force 10+ GB of memory, which crashes applications that load delta objects or call pickle_load with untrusted data. This issue has been patched in version 8.6.2.
Published: 2026-03-20
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Memory Exhaustion Denial of Service
Action: Patch
AI Analysis

Impact

DeepDiff versions from 5.0.0 up to (but not including) 8.6.2 contain a flaw in the pickle unpickler where classes allowed in SAFE_TO_IMPORT can be instantiated with constructor arguments that allocate memory proportional to input data. A crafted 40‑byte pickle payload can force more than ten gigabytes of memory allocation, causing the process to crash and resulting in a denial of service. The vulnerability directly leads to memory exhaustion and application unavailability, impacting system stability and uptime.

Affected Systems

The affected product is DeepDiff by seperman. Versions 5.0.0 through 8.6.1 are impacted. The issue was fixed in version 8.6.2, so any deployment using an earlier release remains vulnerable.

Risk and Exploitability

The CVSS score of 8.7 indicates high severity, yet the EPSS score is under 1%, suggesting a low probability of exploitation at present. The vulnerability is not listed in CISA KEV. The likely attack vector is the processing of untrusted pickle data—such as files or data received over a network—by applications that invoke DeepDiff. Successful exploitation would cause a temporary or permanent service outage due to excessive memory usage.

Generated by OpenCVE AI on March 23, 2026 at 13:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the DeepDiff package to version 8.6.2 or later.
  • Confirm that the application does not load pickle data from untrusted sources or restrict such inputs.
  • If an upgrade is not possible, disable or remove calls to pickle_load that accept external data until a proper fix can be applied.

Generated by OpenCVE AI on March 23, 2026 at 13:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-54jj-px8x-5w5q DeepDiff has Memory Exhaustion DoS through SAFE_TO_IMPORT
History

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-502
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Seperman
Seperman deepdiff
Vendors & Products Seperman
Seperman deepdiff

Fri, 20 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
Description DeepDiff is a project focused on Deep Difference and search of any Python data. From version 5.0.0 to before version 8.6.2, the pickle unpickler _RestrictedUnpickler validates which classes can be loaded but does not limit their constructor arguments. A few of the types in SAFE_TO_IMPORT have constructors that allocate memory proportional to their input (builtins.bytes, builtins.list, builtins.range). A 40-byte pickle payload can force 10+ GB of memory, which crashes applications that load delta objects or call pickle_load with untrusted data. This issue has been patched in version 8.6.2.
Title DeepDiff has Memory Exhaustion DoS through SAFE_TO_IMPORT
Weaknesses CWE-400
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Seperman Deepdiff
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-24T02:03:16.623Z

Reserved: 2026-03-17T21:17:08.886Z

Link: CVE-2026-33155

cve-icon Vulnrichment

Updated: 2026-03-24T02:03:12.675Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-20T21:17:15.910

Modified: 2026-03-23T14:32:02.800

Link: CVE-2026-33155

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-20T20:25:53Z

Links: CVE-2026-33155 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:34:36Z

Weaknesses