#VU123309 Resource exhaustion in jackson-core
Published: February 27, 2026
jackson-core
FasterXML
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to the non-blocking (async) JSON parser in jackson-core bypasses the maxNumberLength constraint (default: 1000 characters) defined in StreamReadConstraints. A remote attacker can send JSON with arbitrarily long numbers through the async parser API and exhaust CPU resources, leading to a denial of service condition.