Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2026-32933
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
AutoMapper Vulnerable to Denial of Service (DoS) via Uncontrolled Recursion
Source: NVD (National Vulnerability Database)
Vulnerability Description
AutoMapper is a convention-based object-object mapper in .NET. Versions prior to 15.1.1 and 16.1.1 are vulnerable to a Denial of Service (DoS) attack. When mapping deeply nested object graphs, the library uses recursive method calls without enforcing a default maximum depth limit. This allows an attacker to provide a specially crafted object graph that exhausts the thread's stack memory, triggering a `StackOverflowException` and causing the entire application process to terminate. Versions 15.1.1 and 16.1.1 fix the issue.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
未经控制的递归
Source: NVD (National Vulnerability Database)
Vulnerability Title
AutoMapper 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
AutoMapper是Lucky Penny Software LLC开源的一个对象映射库。 AutoMapper 15.1.1之前版本和16.1.1之前版本存在安全漏洞,该漏洞源于映射深度嵌套对象图时未强制执行默认最大深度限制,可能导致堆栈溢出和拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
LuckyPennySoftwareAutoMapper >= 16.0.0, < 16.1.1 -
II. Public POCs for CVE-2026-32933
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium
kimi-k2.5 · 8281 chars
Paid plan includes:
In-depth vulnerability mechanism
Trigger conditions & impact
Full executable POC code
Exploit chain & mitigation
POC zip download
100+ AI POC generations per month
III. Intelligence Information for CVE-2026-32933
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2026-32933

No comments yet


Leave a comment