Metrics
Affected Vendors & Products
Wed, 20 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
ssvc
|
Wed, 20 May 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Agronholm
Agronholm apscheduler |
|
| Vendors & Products |
Agronholm
Agronholm apscheduler |
Wed, 20 May 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-116 |
Wed, 20 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Insecure Deserialization in APScheduler Enabling Arbitrary Code Execution | apscheduler: APScheduler: Remote Code Execution via Insecure Deserialization |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Tue, 19 May 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Insecure Deserialization in APScheduler Enabling Arbitrary Code Execution | |
| Weaknesses | CWE-116 CWE-502 |
Tue, 19 May 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The JSONSerializer and CBORSerializer in APScheduler (all versions including 3.10.x and 4.0.0a5) are vulnerable to Remote Code Execution (RCE) via Insecure Deserialization. The unmarshal_object function allows for arbitrary class instantiation and state injection by dynamically importing modules and calling __setstate__ on any class available in the Python environment. An attacker can exploit this by submitting a specially crafted JSON or CBOR payload to an application using these serializers | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-05-19T00:00:00.000Z
Updated: 2026-05-20T15:46:40.527Z
Reserved: 2026-03-09T00:00:00.000Z
Link: CVE-2026-31072
Updated: 2026-05-20T15:03:44.297Z
Status : Deferred
Published: 2026-05-19T16:16:20.610
Modified: 2026-05-20T17:16:20.947
Link: CVE-2026-31072