๐Ÿ” CVE Alert

CVE-2026-32874

HIGH 7.5

UltraJSON has a Memory Leak parsing large integers allows DoS

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
15th

UltraJSON is a fast JSON encoder and decoder written in pure C with bindings for Python 3.7+. Versions 5.4.0 through 5.11.0 contain an accumulating memory leak in JSON parsing large (outside of the range [-2^63, 2^64 - 1]) integers. The leaked memory is a copy of the string form of the integer plus an additional NULL byte. The leak occurs irrespective of whether the integer parses successfully or is rejected due to having more than sys.get_int_max_str_digits() digits, meaning that any sized leak per malicious JSON can be achieved provided that there is no limit on the overall size of the payload. Any service that calls ujson.load()/ujson.loads()/ujson.decode() on untrusted inputs is affected and vulnerable to denial of service attacks. This issue has been fixed in version 5.12.0.

CWE CWE-401
Vendor ultrajson
Product ultrajson
Published Mar 20, 2026
Last Updated Mar 20, 2026
Stay Ahead of the Next One

Get instant alerts for ultrajson ultrajson

Be the first to know when new high vulnerabilities affecting ultrajson ultrajson are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Affected Versions

ultrajson / ultrajson
>= 5.4.0, < 5.12.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/ultrajson/ultrajson/security/advisories/GHSA-wgvc-ghv9-3pmm github.com: https://github.com/ultrajson/ultrajson/commit/4baeb950df780092bd3c89fc702a868e99a3a1d2 github.com: https://github.com/ultrajson/ultrajson/releases/tag/5.12.0