CVE-2026-0994

Name
CVE-2026-0994
Description
A denial-of-service (DoS) vulnerability exists in google.protobuf.json_format.ParseDict() in Python, where the max_recursion_depth limit can be bypassed when parsing nested google.protobuf.Any messages. Due to missing recursion depth accounting inside the internal Any-handling logic, an attacker can supply deeply nested Any structures that bypass the intended recursion limit, eventually exhausting Python’s recursion stack and causing a RecursionError.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
cve-coordination@google.com https://github.com/protocolbuffers/protobuf/pull/25239

Match rules

CPE URI Source package Min version Max version
protobuf == >= V33.0 == None

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
protobuf edge-main 31.1-r1 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
protobuf edge-main 31.1-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
protobuf edge-main 29.4-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
protobuf edge-main 25.6-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
protobuf edge-main 24.4-r4 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
protobuf 3.23-main 31.1-r1 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
protobuf 3.22-main 29.4-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
protobuf 3.21-main 24.4-r4 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
protobuf 3.20-main 24.4-r1 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
protobuf 3.19-main 24.4-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable