Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vqxf-v2gg-x3hc | docling-core vulnerable to Remote Code Execution via unsafe PyYAML usage |
Thu, 09 Apr 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Docling
Docling docling-core |
|
| CPEs | cpe:2.3:a:docling:docling-core:*:*:*:*:*:python:*:* | |
| Vendors & Products |
Docling
Docling docling-core |
Fri, 23 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Docling-project
Docling-project docling-core |
|
| Vendors & Products |
Docling-project
Docling-project docling-core |
Thu, 22 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 22 Jan 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Docling Core (or docling-core) is a library that defines core data types and transformations in the document processing application Docling. A PyYAML-related Remote Code Execution (RCE) vulnerability, namely CVE-2020-14343, is exposed in docling-core starting in version 2.21.0 and prior to version 2.48.4, specifically only if the application uses pyyaml prior to version 5.4 and invokes `docling_core.types.doc.DoclingDocument.load_from_yaml()` passing it untrusted YAML data. The vulnerability has been patched in docling-core version 2.48.4. The fix mitigates the issue by switching `PyYAML` deserialization from `yaml.FullLoader` to `yaml.SafeLoader`, ensuring that untrusted data cannot trigger code execution. Users who cannot immediately upgrade docling-core can alternatively ensure that the installed version of PyYAML is 5.4 or greater. | |
| Title | Docling Core vulnerable to Remote Code Execution via unsafe PyYAML usage | |
| Weaknesses | CWE-502 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-22T15:59:19.883Z
Reserved: 2026-01-19T18:49:20.660Z
Link: CVE-2026-24009
Updated: 2026-01-22T15:59:17.336Z
Status : Analyzed
Published: 2026-01-22T16:16:09.320
Modified: 2026-04-09T14:25:51.167
Link: CVE-2026-24009
No data.
OpenCVE Enrichment
Updated: 2026-04-18T04:00:08Z
Github GHSA