Description
Dasel is a command-line tool and library for querying, modifying, and transforming data structures. Starting in version 3.0.0 and prior to version 3.3.1, Dasel's YAML reader allows an attacker who can supply YAML for processing to trigger extreme CPU and memory consumption. The issue is in the library's own `UnmarshalYAML` implementation, which manually resolves alias nodes by recursively following `yaml.Node.Alias` pointers without any expansion budget, bypassing go-yaml v4's built-in alias expansion limit. Version 3.3.2 contains a patch for the issue.
Published: 2026-03-24
Score: 6.2 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via unlimited YAML alias expansion
Action: Apply Patch
AI Analysis

Impact

Dasel's YAML reader can fully expand aliases without any limit, causing extreme CPU and memory usage when parsing malicious YAML. This leads to a denial‑of‑service condition for the process handling the input. The flaw is a classic uncontrolled recursion weakness (CWE‑674). The impact is that an attacker who can supply YAML data to dasel—whether by feeding a file to the command‑line tool or by invoking the library in an application—can exhaust host resources and make the process unresponsive.

Affected Systems

TomWright's dasel, versions 3.0.0 through 3.3.1, is affected. Version 3.3.2 fixes the issue.

Risk and Exploitability

The CVSS score of 6.2 indicates moderate severity. The EPSS score of less than 1% signals a low likelihood of exploitation in the wild, and the vulnerability is not listed in CISA's KEV catalog. Attackers would need to supply crafted YAML to dasel; the vulnerability is local unless an application incorporating dasel processes untrusted data from a remote source. No public exploit is documented. Patch or mitigate the unbounded expansion to eliminate the risk.

Generated by OpenCVE AI on March 25, 2026 at 19:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade tomwright/dasel to version 3.3.2 or later
  • Verify that the installed binary matches the patched version
  • If the tool is used within an application, ensure it cannot receive untrusted YAML from external inputs
  • Monitor resource usage for signs of denial‑of‑service attacks

Generated by OpenCVE AI on March 25, 2026 at 19:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-4fcp-jxh7-23x8 Dasel has unbounded YAML alias expansion in dasel leads to CPU/memory denial of service
History

Thu, 26 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:tomwright:dasel:*:*:*:*:*:go:*:*

Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Tomwright
Tomwright dasel
Vendors & Products Tomwright
Tomwright dasel

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Description Dasel is a command-line tool and library for querying, modifying, and transforming data structures. Starting in version 3.0.0 and prior to version 3.3.1, Dasel's YAML reader allows an attacker who can supply YAML for processing to trigger extreme CPU and memory consumption. The issue is in the library's own `UnmarshalYAML` implementation, which manually resolves alias nodes by recursively following `yaml.Node.Alias` pointers without any expansion budget, bypassing go-yaml v4's built-in alias expansion limit. Version 3.3.2 contains a patch for the issue.
Title Dasel has unbounded YAML alias expansion in dasel leads to CPU/memory denial of service
Weaknesses CWE-674
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-26T12:24:32.421Z

Reserved: 2026-03-18T21:23:36.677Z

Link: CVE-2026-33320

cve-icon Vulnrichment

Updated: 2026-03-26T12:24:27.905Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-24T01:17:02.203

Modified: 2026-03-25T16:08:49.057

Link: CVE-2026-33320

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:40:45Z

Weaknesses