A denial-of-service (DoS) vulnerability exists in google.protobuf.json_format.ParseDict() in Python, where the max_recursion_depth limit can be bypassed when parsing nested google.protobuf.Any messages.
Due to missing recursion depth accounting inside the internal Any-handling logic, an attacker can supply deeply nested Any structures that bypass the intended recursion limit, eventually exhausting Python’s recursion stack and causing a RecursionError.
References
| Link | Resource |
|---|---|
| https://github.com/protocolbuffers/protobuf/pull/25239 | Patch Vendor Advisory |
Configurations
History
09 Apr 2026, 14:19
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| References | () https://github.com/protocolbuffers/protobuf/pull/25239 - Patch, Vendor Advisory | |
| First Time |
Google protobuf
|
|
| CPE | cpe:2.3:a:google:protobuf:*:*:*:*:*:*:*:* |
23 Jan 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-23 15:16
Updated : 2026-04-09 14:19
NVD link : CVE-2026-0994
Mitre link : CVE-2026-0994
CVE.ORG link : CVE-2026-0994
JSON object : View
Products Affected
- protobuf
CWE
CWE-674
Uncontrolled Recursion
