VYPR
High severity7.8NVD Advisory· Published May 1, 2026· Updated May 4, 2026

CVE-2026-7584

CVE-2026-7584

Description

The LabOne Q serialization framework uses a class-loading mechanism (import_cls) to dynamically import and instantiate Python classes during deserialization. Prior to the fix, this mechanism accepted arbitrary fully-qualified class names from the serialized data without any validation of the target class or restriction on which modules could be imported. An attacker can craft a serialized experiment file that causes the deserialization engine to import and instantiate arbitrary Python classes with attacker-controlled constructor arguments, resulting in arbitrary code execution in the context of the user running the Python process. Exploitation requires the victim to load a malicious file using LabOne Q's deserialization functions, for example a compromised experiment file shared for collaboration or support purposes.

Affected products

6
  • Zhinst/Labone Q6 versions
    cpe:2.3:a:zhinst:labone_q:*:*:*:*:*:*:*:*+ 5 more
    • cpe:2.3:a:zhinst:labone_q:*:*:*:*:*:*:*:*range: >=2.41.0,<26.1.2
    • cpe:2.3:a:zhinst:labone_q:26.4.0:beta1:*:*:*:*:*:*
    • cpe:2.3:a:zhinst:labone_q:26.4.0:beta2:*:*:*:*:*:*
    • cpe:2.3:a:zhinst:labone_q:26.4.0:beta3:*:*:*:*:*:*
    • cpe:2.3:a:zhinst:labone_q:26.4.0:beta4:*:*:*:*:*:*
    • cpe:2.3:a:zhinst:labone_q:26.4.0:beta5:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.