A HIGH-severity vulnerability identified as CVE-2026-29062 has been published on March 6, 2026 with a CVSS base score of 8.7. This security advisory provides a detailed breakdown of the vulnerability, its potential impact, weakness classification, and actionable steps to protect your systems.
Table of Contents
ToggleVulnerability Details
CVE ID: CVE-2026-29062
Severity: HIGH
CVSS Score: 8.7
Published: March 6, 2026
Weakness (CWE): CWE-770
| Attack Vector | Network |
| Attack Complexity | Low |
| Privileges Required | None |
| User Interaction | None |
Technical Description
jackson-core contains core low-level incremental ("streaming") parser and generator abstractions used by Jackson Data Processor. From version 3.0.0 to before version 3.1.0, the UTF8DataInputJsonParser, which is used when parsing from a java.io.DataInput source, bypasses the maxNestingDepth constraint (default: 500) defined in StreamReadConstraints. A similar issue was found in ReaderBasedJsonParser. This allows a user to supply a JSON document with excessive nesting, which can cause a StackOverflowError when the structure is processed, leading to a Denial of Service (DoS). This issue has been patched in version 3.1.0.
Potential Impact
If exploited, this high-severity vulnerability could allow an attacker to cause significant damage to affected systems. Organizations running affected software should treat this as a priority remediation item.
Recommended Action
No official patch is available yet. Until one is released:
- Monitor the official NVD page and vendor channels for patch announcements.
- Restrict access to the affected system or service where possible.
- Apply network-level mitigations such as firewall rules or WAF policies.
- Enable logging and alerting for anomalous activity related to this vulnerability.
- Review your incident response plan in case of active exploitation.
References
Related Security Advisories
- [HIGH] CVE-2026-1321 — CVSS 8.1 (March 5, 2026) — HIGH / CVSS 8.1
- [HIGH] CVE-2026-1876 — CVSS 8.7 (March 3, 2026) — HIGH / CVSS 8.7
- [HIGH] CVE-2026-20416 — CVSS 7.2 (March 2, 2026) — HIGH / CVSS 7.2

![[HIGH] CVE-2026-0234 — CVSS 7.2 (April 13, 2026)](https://atlas-cybersecurity.com/wp-content/plugins/elementor/assets/images/placeholder.png)



