๐Ÿ” CVE Alert

CVE-2026-7584

HIGH 7.8

Arbitrary Code Execution via Unsafe Deserialization in LabOne Q

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

The LabOne Q serialization framework uses a class-loading mechanism (import_cls) to dynamically import and instantiate Python classes during deserialization. Prior to the fix, this mechanism accepted arbitrary fully-qualified class names from the serialized data without any validation of the target class or restriction on which modules could be imported. An attacker can craft a serialized experiment file that causes the deserialization engine to import and instantiate arbitrary Python classes with attacker-controlled constructor arguments, resulting in arbitrary code execution in the context of the user running the Python process. Exploitation requires the victim to load a malicious file using LabOne Q's deserialization functions, for example a compromised experiment file shared for collaboration or support purposes.

CWE CWE-502
Vendor zurich instruments
Product labone q
Published May 1, 2026
Stay Ahead of the Next One

Get instant alerts for zurich instruments labone q

Be the first to know when new high vulnerabilities affecting zurich instruments labone q are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Zurich Instruments / LabOne Q
2.41.0 < 26.1.2 26.4.0b1 โ‰ค 26.4.0b5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
zhinst.com: https://www.zhinst.com/support/security/2026/zi-sa-2026-002/