Impact
Unfurl versions before 2026.04 contain an unbounded zlib decompression flaw in the parse_compressed.py module. When a client submits an excessively compressed payload through the /json/visjs URL parameter, the server decompresses it without bounds, causing the application to consume gigabytes of memory and eventually crash. The result is a complete service outage for users of the Unfurl web interface. The issue maps to the CWE-409 (Uncontrolled Resource Consumption) and CWE-770 (Uncontrolled Memory Allocation) weaknesses.
Affected Systems
The affected product is Unfurl developed by obsidianforensics. All releases older than version 2026.04 are impacted; upgrading to v2026.04 or later releases the vulnerability.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity vulnerability. The EPSS score is not provided, but the lack of authentication requirements and the straightforward request structure make exploitation technically feasible. Because it is not listed in the CISA KEV catalog, there is no current evidence of widespread exploitation. The likely attack vector is remote HTTP requests to the /json/visjs endpoint, as inferred from the description.
OpenCVE Enrichment
Github GHSA