๐Ÿ” CVE Alert

CVE-2026-29062

UNKNOWN 0.0

jackson-core: Nesting Depth Constraint Bypass in `UTF8DataInputJsonParser` potentially allowing Resource Exhaustion

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

jackson-core contains core low-level incremental ("streaming") parser and generator abstractions used by Jackson Data Processor. From version 3.0.0 to before version 3.1.0, the UTF8DataInputJsonParser, which is used when parsing from a java.io.DataInput source, bypasses the maxNestingDepth constraint (default: 500) defined in StreamReadConstraints. A similar issue was found in ReaderBasedJsonParser. This allows a user to supply a JSON document with excessive nesting, which can cause a StackOverflowError when the structure is processed, leading to a Denial of Service (DoS). This issue has been patched in version 3.1.0.

CWE CWE-770
Vendor fasterxml
Product jackson-core
Published Mar 6, 2026
Last Updated Mar 9, 2026
Stay Ahead of the Next One

Get instant alerts for fasterxml jackson-core

Be the first to know when new unknown vulnerabilities affecting fasterxml jackson-core are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

FasterXML / jackson-core
>= 3.0.0, < 3.1.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/FasterXML/jackson-core/security/advisories/GHSA-6v53-7c9g-w56r github.com: https://github.com/FasterXML/jackson-core/pull/1554 github.com: https://github.com/FasterXML/jackson-core/commit/8b25fd67f20583e75fb09564ce1eaab06cd5a902