CVE-2026-7584
Gravedad CVSS v4.0:
ALTA
Tipo:
CWE-502
Deserialización de datos no confiables
Fecha de publicación:
01/05/2026
Última modificación:
04/05/2026
Descripción
*** Pendiente de traducción *** The LabOne Q serialization framework uses a class-loading mechanism (import_cls) to dynamically import and instantiate Python classes during deserialization. Prior to the fix, this mechanism accepted arbitrary fully-qualified class names from the serialized data without any validation of the target class or restriction on which modules could be imported. An attacker can craft a serialized experiment file that causes the deserialization engine to import and instantiate arbitrary Python classes with attacker-controlled constructor arguments, resulting in arbitrary code execution in the context of the user running the Python process. Exploitation requires the victim to load a malicious file using LabOne Q's deserialization functions, for example a compromised experiment file shared for collaboration or support purposes.
Impacto
Puntuación base 4.0
8.40
Gravedad 4.0
ALTA
Puntuación base 3.x
7.80
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:zhinst:labone_q:*:*:*:*:*:*:*:* | 2.41.0 (incluyendo) | 26.1.2 (excluyendo) |
| cpe:2.3:a:zhinst:labone_q:26.4.0:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:zhinst:labone_q:26.4.0:beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:zhinst:labone_q:26.4.0:beta3:*:*:*:*:*:* | ||
| cpe:2.3:a:zhinst:labone_q:26.4.0:beta4:*:*:*:*:*:* | ||
| cpe:2.3:a:zhinst:labone_q:26.4.0:beta5:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



