docling-core vulnerable to Remote Code Execution via unsafe PyYAML usage
High severity
GitHub Reviewed
Published
Jan 22, 2026
in
docling-project/docling-core
•
Updated Jan 22, 2026
Description
Published by the National Vulnerability Database
Jan 22, 2026
Published to the GitHub Advisory Database
Jan 22, 2026
Reviewed
Jan 22, 2026
Last updated
Jan 22, 2026
Impact
A PyYAML-related Remote Code Execution (RCE) vulnerability, namely CVE-2020-14343, is exposed in
docling-core >=2.21.0, <2.48.4and, specifically only if the application usespyyaml < 5.4and invokesdocling_core.types.doc.DoclingDocument.load_from_yaml()passing it untrusted YAML data.Patches
The vulnerability has been patched in
docling-coreversion 2.48.4.The fix mitigates the issue by switching
PyYAMLdeserialization fromyaml.FullLoadertoyaml.SafeLoader, ensuring that untrusted data cannot trigger code execution.Workarounds
Users who cannot immediately upgrade
docling-corecan alternatively ensure that the installed version ofPyYAMLis 5.4 or greater, which supposedly patches CVE-2020-14343.References
References