CVE-2026-4224

Published: Mar 16, 2026 Last Modified: Mar 17, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 6,0
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A

Description

AI Translation Available

When an Expat parser with a registered ElementDeclHandler parses an inline
document type definition containing a deeply nested content model a C stack
overflow occurs.

674

Uncontrolled Recursion

Draft
Common Consequences
Security Scopes Affected:
Availability Confidentiality
Potential Impacts:
Dos: Resource Consumption (Cpu) Dos: Resource Consumption (Memory) Read Application Data
Applicable Platforms
All platforms may be affected
View CWE Details
http://www.openwall.com/lists/oss-security/2026/03/16/4
https://github.com/python/cpython/commit/196edfb06a7458377d4d0f4b3cd41724c1f3bd…
https://github.com/python/cpython/commit/e0a8a6da90597a924b300debe045cdb4628ee1…
https://github.com/python/cpython/commit/eb0e8be3a7e11b87d198a2c3af1ed0eccf5327…
https://github.com/python/cpython/issues/145986
https://github.com/python/cpython/pull/145987
https://mail.python.org/archives/list/[email protected]/thread/5M7CG…