CVE-2021-39194
Java vulnerability analysis and mitigation

Overview

CVE-2021-39194 affects kaml, an open source implementation of the YAML format with support for kotlinx.serialization. The vulnerability was discovered in September 2021 and affects versions prior to 0.35.3. The issue occurs when attackers can provide arbitrary YAML input to applications using kaml with polymorphic serialization in the default tagged polymorphism style (GitHub Advisory).

Technical details

The vulnerability occurs when processing YAML input for a polymorphic type that provides a tag but no value for the object. When such malformed input is provided, the application enters an endless loop during parsing, consuming 100% CPU resources. This only affects applications using polymorphic serialization with the default tagged polymorphism style, while applications using the property polymorphism style are not affected (GitHub Advisory, GitHub Issue). The vulnerability has been assigned a CVSS v3.1 base score of 4.3 (Medium) with vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L (NVD).

Impact

Successful exploitation of this vulnerability could result in resource starvation and denial of service. When triggered, the application would enter an infinite loop consuming CPU resources, potentially affecting the availability of the service (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in version 0.35.3 and later versions. Users should upgrade to the patched version. There are no known workarounds for this vulnerability (GitHub Advisory, GitHub Commit).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-29847HIGH7.5
  • JavaJava
  • org.apache.linkis:linkis
NoYesJan 19, 2026
CVE-2026-1050MEDIUM6.9
  • JavaJava
  • net.risesoft:risenet-y9boot-support-platform-service
NoNoJan 17, 2026
CVE-2025-15104MEDIUM6.9
  • JavaScriptJavaScript
  • vnu-jar
NoNoJan 16, 2026
CVE-2025-59355MEDIUM6.5
  • JavaJava
  • org.apache.linkis:linkis-metadata
NoYesJan 19, 2026
CVE-2026-0858MEDIUM5.1
  • JavaJava
  • net.sourceforge.plantuml:plantuml
NoYesJan 16, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management