Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.yaml/snakeyaml@1.14
purl pkg:maven/org.yaml/snakeyaml@1.14
Next non-vulnerable version 2.0
Latest non-vulnerable version 2.0
Risk 10.0
Vulnerabilities affecting this package (8)
Vulnerability Summary Fixed by
VCID-4nu3-fknt-puej
Aliases:
CVE-2022-38750
GHSA-hhhw-99gj-p3c3
snakeYAML before 1.31 vulnerable to Denial of Service due to Out-of-bounds Write Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
1.31
Affected by 3 other vulnerabilities.
VCID-6354-p39b-zbhp
Aliases:
CVE-2022-38749
GHSA-c4r9-r8fh-9vj2
snakeYAML before 1.31 vulnerable to Denial of Service due to Out-of-bounds Write Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
1.31
Affected by 3 other vulnerabilities.
VCID-dmkc-42vj-gbhc
Aliases:
CVE-2022-1471
GHSA-mjmj-j48q-9wg2
SnakeYaml Constructor Deserialization Remote Code Execution ### Summary SnakeYaml's `Constructor` class, which inherits from `SafeConstructor`, allows any type be deserialized given the following line: new Yaml(new Constructor(TestDataClass.class)).load(yamlContent); Types do not have to match the types of properties in the target class. A `ConstructorException` is thrown, but only after a malicious payload is deserialized. ### Severity High, lack of type checks during deserialization allows remote code execution. ### Proof of Concept Execute `bash run.sh`. The PoC uses Constructor to deserialize a payload for RCE. RCE is demonstrated by using a payload which performs a http request to http://127.0.0.1:8000. Example output of successful run of proof of concept: ``` $ bash run.sh [+] Downloading snakeyaml if needed [+] Starting mock HTTP server on 127.0.0.1:8000 to demonstrate RCE nc: no process found [+] Compiling and running Proof of Concept, which a payload that sends a HTTP request to mock web server. [+] An exception is expected. Exception: Cannot create property=payload for JavaBean=Main$TestDataClass@3cbbc1e0 in 'string', line 1, column 1: payload: !!javax.script.ScriptEn ... ^ Can not set java.lang.String field Main$TestDataClass.payload to javax.script.ScriptEngineManager in 'string', line 1, column 10: payload: !!javax.script.ScriptEngineManag ... ^ at org.yaml.snakeyaml.constructor.Constructor$ConstructMapping.constructJavaBean2ndStep(Constructor.java:291) at org.yaml.snakeyaml.constructor.Constructor$ConstructMapping.construct(Constructor.java:172) at org.yaml.snakeyaml.constructor.Constructor$ConstructYamlObject.construct(Constructor.java:332) at org.yaml.snakeyaml.constructor.BaseConstructor.constructObjectNoCheck(BaseConstructor.java:230) at org.yaml.snakeyaml.constructor.BaseConstructor.constructObject(BaseConstructor.java:220) at org.yaml.snakeyaml.constructor.BaseConstructor.constructDocument(BaseConstructor.java:174) at org.yaml.snakeyaml.constructor.BaseConstructor.getSingleData(BaseConstructor.java:158) at org.yaml.snakeyaml.Yaml.loadFromReader(Yaml.java:491) at org.yaml.snakeyaml.Yaml.load(Yaml.java:416) at Main.main(Main.java:37) Caused by: java.lang.IllegalArgumentException: Can not set java.lang.String field Main$TestDataClass.payload to javax.script.ScriptEngineManager at java.base/jdk.internal.reflect.UnsafeFieldAccessorImpl.throwSetIllegalArgumentException(UnsafeFieldAccessorImpl.java:167) at java.base/jdk.internal.reflect.UnsafeFieldAccessorImpl.throwSetIllegalArgumentException(UnsafeFieldAccessorImpl.java:171) at java.base/jdk.internal.reflect.UnsafeObjectFieldAccessorImpl.set(UnsafeObjectFieldAccessorImpl.java:81) at java.base/java.lang.reflect.Field.set(Field.java:780) at org.yaml.snakeyaml.introspector.FieldProperty.set(FieldProperty.java:44) at org.yaml.snakeyaml.constructor.Constructor$ConstructMapping.constructJavaBean2ndStep(Constructor.java:286) ... 9 more [+] Dumping Received HTTP Request. Will not be empty if PoC worked GET /proof-of-concept HTTP/1.1 User-Agent: Java/11.0.14 Host: localhost:8000 Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2 Connection: keep-alive ``` ### Further Analysis Potential mitigations include, leveraging SnakeYaml's SafeConstructor while parsing untrusted content. See https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64581479 for discussion on the subject. ### Timeline **Date reported**: 4/11/2022 **Date fixed**: [30/12/2022](https://bitbucket.org/snakeyaml/snakeyaml/pull-requests/44) **Date disclosed**: 10/13/2022
2.0
Affected by 0 other vulnerabilities.
VCID-e8hu-czv4-yyc5
Aliases:
CVE-2017-18640
GHSA-rvwf-54qp-4r6v
SnakeYAML Entity Expansion during load operation The Alias feature in SnakeYAML 1.18 allows entity expansion during a load operation, a related issue to CVE-2003-1564.
1.26
Affected by 7 other vulnerabilities.
VCID-fb8u-g65k-hffs
Aliases:
CVE-2022-38752
GHSA-9w3m-gqgf-c4p9
snakeYAML before 1.32 vulnerable to Denial of Service due to Out-of-bounds Write Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DoS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.
1.32
Affected by 1 other vulnerability.
VCID-mm3e-4pej-byed
Aliases:
CVE-2022-25857
GHSA-3mc7-4q67-w48m
Uncontrolled Resource Consumption in snakeyaml The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.
1.31
Affected by 3 other vulnerabilities.
VCID-qxfs-sq38-jfad
Aliases:
CVE-2022-38751
GHSA-98wm-3w3q-mw94
snakeYAML before 1.31 vulnerable to Denial of Service due to Out-of-bounds Write Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
1.31
Affected by 3 other vulnerabilities.
VCID-sqsn-ygsg-yfdu
Aliases:
CVE-2022-41854
GHSA-w37g-rhq8-7m4j
Snakeyaml vulnerable to Stack overflow leading to denial of service Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.
1.32
Affected by 1 other vulnerability.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T22:17:54.374566+00:00 GitLab Importer Affected by VCID-dmkc-42vj-gbhc https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-1471.yml 38.4.0
2026-04-16T22:15:15.175333+00:00 GitLab Importer Affected by VCID-sqsn-ygsg-yfdu https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-41854.yml 38.4.0
2026-04-16T22:08:21.205032+00:00 GitLab Importer Affected by VCID-qxfs-sq38-jfad https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-38751.yml 38.4.0
2026-04-16T22:08:20.998488+00:00 GitLab Importer Affected by VCID-fb8u-g65k-hffs https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-38752.yml 38.4.0
2026-04-16T22:08:20.688046+00:00 GitLab Importer Affected by VCID-6354-p39b-zbhp https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-38749.yml 38.4.0
2026-04-16T22:08:20.491320+00:00 GitLab Importer Affected by VCID-4nu3-fknt-puej https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-38750.yml 38.4.0
2026-04-16T22:07:55.275129+00:00 GitLab Importer Affected by VCID-mm3e-4pej-byed https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-25857.yml 38.4.0
2026-04-16T20:59:19.630545+00:00 GitLab Importer Affected by VCID-e8hu-czv4-yyc5 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2017-18640.yml 38.4.0
2026-04-11T23:35:24.656647+00:00 GitLab Importer Affected by VCID-dmkc-42vj-gbhc https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-1471.yml 38.3.0
2026-04-11T23:32:22.209592+00:00 GitLab Importer Affected by VCID-sqsn-ygsg-yfdu https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-41854.yml 38.3.0
2026-04-11T23:24:45.626002+00:00 GitLab Importer Affected by VCID-qxfs-sq38-jfad https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-38751.yml 38.3.0
2026-04-11T23:24:45.418360+00:00 GitLab Importer Affected by VCID-fb8u-g65k-hffs https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-38752.yml 38.3.0
2026-04-11T23:24:45.097944+00:00 GitLab Importer Affected by VCID-6354-p39b-zbhp https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-38749.yml 38.3.0
2026-04-11T23:24:44.888649+00:00 GitLab Importer Affected by VCID-4nu3-fknt-puej https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-38750.yml 38.3.0
2026-04-11T23:24:19.659035+00:00 GitLab Importer Affected by VCID-mm3e-4pej-byed https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-25857.yml 38.3.0
2026-04-11T22:10:32.373754+00:00 GitLab Importer Affected by VCID-e8hu-czv4-yyc5 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2017-18640.yml 38.3.0
2026-04-02T23:40:03.201359+00:00 GitLab Importer Affected by VCID-dmkc-42vj-gbhc https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-1471.yml 38.1.0
2026-04-02T23:37:32.017512+00:00 GitLab Importer Affected by VCID-sqsn-ygsg-yfdu https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-41854.yml 38.1.0
2026-04-02T23:31:08.189818+00:00 GitLab Importer Affected by VCID-qxfs-sq38-jfad https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-38751.yml 38.1.0
2026-04-02T23:31:07.996944+00:00 GitLab Importer Affected by VCID-fb8u-g65k-hffs https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-38752.yml 38.1.0
2026-04-02T23:31:07.690321+00:00 GitLab Importer Affected by VCID-6354-p39b-zbhp https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-38749.yml 38.1.0
2026-04-02T23:31:07.491333+00:00 GitLab Importer Affected by VCID-4nu3-fknt-puej https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-38750.yml 38.1.0
2026-04-02T23:30:44.209423+00:00 GitLab Importer Affected by VCID-mm3e-4pej-byed https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-25857.yml 38.1.0
2026-04-02T22:23:06.415530+00:00 GitLab Importer Affected by VCID-e8hu-czv4-yyc5 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2017-18640.yml 38.1.0
2026-04-01T18:02:32.803588+00:00 GitLab Importer Affected by VCID-dmkc-42vj-gbhc https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-1471.yml 38.0.0
2026-04-01T17:59:44.907384+00:00 GitLab Importer Affected by VCID-sqsn-ygsg-yfdu https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-41854.yml 38.0.0
2026-04-01T17:52:42.120849+00:00 GitLab Importer Affected by VCID-qxfs-sq38-jfad https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-38751.yml 38.0.0
2026-04-01T17:52:41.904827+00:00 GitLab Importer Affected by VCID-fb8u-g65k-hffs https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-38752.yml 38.0.0
2026-04-01T17:52:41.338850+00:00 GitLab Importer Affected by VCID-6354-p39b-zbhp https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-38749.yml 38.0.0
2026-04-01T17:52:41.127597+00:00 GitLab Importer Affected by VCID-4nu3-fknt-puej https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-38750.yml 38.0.0
2026-04-01T17:52:15.780712+00:00 GitLab Importer Affected by VCID-mm3e-4pej-byed https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2022-25857.yml 38.0.0
2026-04-01T16:40:53.402530+00:00 GitLab Importer Affected by VCID-e8hu-czv4-yyc5 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.yaml/snakeyaml/CVE-2017-18640.yml 38.0.0