CVE-2026-32874

EUVD-2026-13443
UltraJSON is a fast JSON encoder and decoder written in pure C with bindings for Python 3.7+. Versions 5.4.0 through 5.11.0 contain an accumulating memory leak in JSON parsing large (outside of the range [-2^63, 2^64 - 1]) integers. The leaked memory is a copy of the string form of the integer plus an additional NULL byte. The leak occurs irrespective of whether the integer parses successfully or is rejected due to having more than sys.get_int_max_str_digits() digits, meaning that any sized leak per malicious JSON can be achieved provided that there is no limit on the overall size of the payload. Any service that calls ujson.load()/ujson.loads()/ujson.decode() on untrusted inputs is affected and vulnerable to denial of service attacks. This issue has been fixed in version 5.12.0.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 22%
Affected Products (NVD)
VendorProductVersion
ultrajson_projectultrajson
5.4.0 ≤
𝑥
< 5.12.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ujson
bookworm
vulnerable
bullseye
postponed
forky
vulnerable
sid
vulnerable
trixie
vulnerable
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
collada2gltf
bionic
not-affected
jammy
not-affected
noble
dne
questing
dne
resolute
dne
xenial
not-affected
pandas
bionic
not-affected
focal
not-affected
jammy
not-affected
noble
not-affected
questing
not-affected
resolute
not-affected
trusty
not-affected
xenial
not-affected
ujson
bionic
not-affected
focal
not-affected
jammy
not-affected
noble
Fixed 5.9.0-1ubuntu0.1~esm1
released
questing
Fixed 5.10.0-1ubuntu0.1
released
resolute
Fixed 5.11.0-3ubuntu0.1
released
xenial
not-affected