CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
24.3%
yamlbeans is vulnerable toArbitrary Code Execution. The vulnerability exists due to allowing arbitrary YAML tags by default which can represent arbitrary Java classes, which allows an attacker to execute arbitrary code if the application parses untrusted YAML files.