The LabOne Q serialization framework uses a class-loading mechanism (import_cls) to dynamically import and instantiate Python classes during deserialization. Prior to the fix, this mechanism accepted arbitrary fully-qualified class names from the serialized data without any validation of the target class or restriction on which modules could be imported. An attacker can craft a serialized experiment file that causes the deserialization engine to import and instantiate arbitrary Python classes with attacker-controlled constructor arguments, resulting in arbitrary code execution in the context of the user running the Python process. Exploitation requires the victim to load a malicious file using LabOne Q's deserialization functions, for example a compromised experiment file shared for collaboration or support purposes.
References
| Link | Resource |
|---|---|
| https://www.zhinst.com/support/security/2026/zi-sa-2026-002/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
04 May 2026, 18:23
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:zhinst:labone_q:26.4.0:beta4:*:*:*:*:*:* cpe:2.3:a:zhinst:labone_q:*:*:*:*:*:*:*:* cpe:2.3:a:zhinst:labone_q:26.4.0:beta5:*:*:*:*:*:* cpe:2.3:a:zhinst:labone_q:26.4.0:beta2:*:*:*:*:*:* cpe:2.3:a:zhinst:labone_q:26.4.0:beta1:*:*:*:*:*:* cpe:2.3:a:zhinst:labone_q:26.4.0:beta3:*:*:*:*:*:* |
|
| References | () https://www.zhinst.com/support/security/2026/zi-sa-2026-002/ - Vendor Advisory | |
| First Time |
Zhinst labone Q
Zhinst |
01 May 2026, 08:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-05-01 08:16
Updated : 2026-05-04 18:23
NVD link : CVE-2026-7584
Mitre link : CVE-2026-7584
CVE.ORG link : CVE-2026-7584
JSON object : View
Products Affected
zhinst
- labone_q
CWE
CWE-502
Deserialization of Untrusted Data
