Dasel has unbounded YAML alias expansion in dasel leads to CPU/memory denial of service
Description
Dasel is a command-line tool and library for querying, modifying, and transforming data structures. Starting in version 3.0.0 and prior to version 3.3.1, Dasel's YAML reader allows an attacker who can supply YAML for processing to trigger extreme CPU and memory consumption. The issue is in the library's own UnmarshalYAML implementation, which manually resolves alias nodes by recursively following yaml.Node.Alias pointers without any expansion budget, bypassing go-yaml v4's built-in alias expansion limit. Version 3.3.2 contains a patch for the issue.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Dasel before 3.3.1 has a YAML alias expansion bomb vulnerability that allows attackers to cause a denial of service via crafted YAML.
Vulnerability
CVE-2026-33320 is a denial of service vulnerability in the Dasel command-line tool and library, affecting versions 3.0.0 through 3.3.1. The bug exists in Dasel's custom UnmarshalYAML implementation for YAML parsing, which recursively resolves alias nodes by following yaml.Node.Alias pointers without any expansion budget. This bypasses the built-in alias expansion limit in go-yaml v4, allowing a small crafted input to cause exponential growth in CPU and memory consumption [1][2].
Exploitation
An attacker who can supply YAML for processing—for example, by feeding Dasel a malicious file or piping data to the command-line tool—can trigger the vulnerability. The reference advisory demonstrates a 342-byte payload with a 9-level alias bomb (each level referencing the previous alias multiple times) that causes unbounded recursive expansion. The affected code path is reached when Dasel processes YAML using its parsing library, which ultimately calls the UnmarshalYAML hook that recursively follows value.Alias pointers without a stopping condition or budget [2].
Impact
Successful exploitation results in extreme CPU and memory consumption, effectively causing a denial of service. The test payload did not complete within 5 seconds and exhibited unbounded resource growth, indicating that even moderate-sized inputs can exhaust system resources, making Dasel unresponsive or causing it to crash [2].
Mitigation
The issue has been patched in Dasel version 3.3.2. Users should upgrade to this or a later version to eliminate the vulnerability. No workarounds are mentioned in the advisories [1][2].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/tomwright/dasel/v3Go | >= 3.0.0, < 3.3.2 | 3.3.2 |
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-4fcp-jxh7-23x8ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-33320ghsaADVISORY
- github.com/TomWright/dasel/security/advisories/GHSA-4fcp-jxh7-23x8ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.