A security vulnerability has been detected in OWASP DefectDojo up to 2.55.4. This vulnerability affects the function input_zip.read of the file parser.py of the component SonarQubeParser/MSDefenderParser. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 2.56.0 is able to resolve this issue. The identifier of the patch is e8f1e5131535b8fd80a7b1b3085d676295fdcd41. Upgrading the affected component is recommended.

Project Subscriptions

Vendors Products
Defectdojo Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 10 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1284
CPEs cpe:2.3:a:owasp:defectdojo:*:*:*:*:*:*:*:*

Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Owasp
Owasp defectdojo
Vendors & Products Owasp
Owasp defectdojo

Mon, 09 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 11:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in OWASP DefectDojo up to 2.55.4. This vulnerability affects the function input_zip.read of the file parser.py of the component SonarQubeParser/MSDefenderParser. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 2.56.0 is able to resolve this issue. The identifier of the patch is e8f1e5131535b8fd80a7b1b3085d676295fdcd41. Upgrading the affected component is recommended.
Title OWASP DefectDojo SonarQubeParser/MSDefenderParser parser.py input_zip.read denial of service
Weaknesses CWE-404
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-09T17:25:37.675Z

Reserved: 2026-03-08T17:23:16.744Z

Link: CVE-2026-3816

cve-icon Vulnrichment

Updated: 2026-03-09T17:25:20.115Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-09T11:16:06.450

Modified: 2026-03-10T19:55:40.700

Link: CVE-2026-3816

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-10T14:07:32Z

Weaknesses