Home

Description

The JSONSerializer and CBORSerializer in APScheduler (all versions including 3.10.x and 4.0.0a5) are vulnerable to Remote Code Execution (RCE) via Insecure Deserialization. The unmarshal_object function allows for arbitrary class instantiation and state injection by dynamically importing modules and calling __setstate__ on any class available in the Python environment. An attacker can exploit this by submitting a specially crafted JSON or CBOR payload to an application using these serializers

PUBLISHED Reserved 2026-03-09 | Published 2026-05-19 | Updated 2026-05-20 | Assigner mitre

References

gist.github.com/nedlir/11fb77f35a59cbba73392a086b02a9c6 exploit

github.com/agronholm/apscheduler

gist.github.com/nedlir/11fb77f35a59cbba73392a086b02a9c6

cve.org (CVE-2026-31072)

nvd.nist.gov (CVE-2026-31072)

Download JSON