Vulnerability Description
The JSONSerializer and CBORSerializer in APScheduler (all versions including 3.10.x and 4.0.0a5) are vulnerable to Remote Code Execution (RCE) via Insecure Deserialization. The unmarshal_object function allows for arbitrary class instantiation and state injection by dynamically importing modules and calling __setstate__ on any class available in the Python environment. An attacker can exploit this by submitting a specially crafted JSON or CBOR payload to an application using these serializers
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://gist.github.com/nedlir/11fb77f35a59cbba73392a086b02a9c6
- https://github.com/agronholm/apscheduler
- https://gist.github.com/nedlir/11fb77f35a59cbba73392a086b02a9c6
FAQ
What is CVE-2026-31072?
CVE-2026-31072 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The JSONSerializer and CBORSerializer in APScheduler (all versions including 3.10.x and 4.0.0a5) are vulnerable to Remote Code Execution (RCE) via Insecure Deserialization. The unmarshal_object functi...
How severe is CVE-2026-31072?
CVE-2026-31072 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-31072?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.