Description
MarkUs is a web application for the submission and grading of student assignments. Prior to version 2.9.4, MarkUs allows course instructors to upload YAML files to create/update various entities (e.g., assignment settings). These YAML files are parsed with aliases enabled. This issue has been patched in version 2.9.4.
Published: 2026-03-06
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via YAML alias expansion
Action: Patch immediately
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:markusproject:markus:*:*:*:*:*:*:*:*

Fri, 06 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Markusproject
Markusproject markus
Vendors & Products Markusproject
Markusproject markus

Fri, 06 Mar 2026 03:30:00 +0000

Type Values Removed Values Added
Description MarkUs is a web application for the submission and grading of student assignments. Prior to version 2.9.4, MarkUs allows course instructors to upload YAML files to create/update various entities (e.g., assignment settings). These YAML files are parsed with aliases enabled. This issue has been patched in version 2.9.4.
Title MarkUs: YAML alias (‘billion laughs’) DoS in config upload
Weaknesses CWE-776
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Markusproject Markus
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-06T16:10:43.887Z

Reserved: 2026-02-24T02:31:33.267Z

Link: CVE-2026-27807

cve-icon Vulnrichment

Updated: 2026-03-06T15:50:50.844Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-06T04:16:07.810

Modified: 2026-03-12T17:22:20.530

Link: CVE-2026-27807

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T10:00:10Z

Weaknesses