PT-2026-26547 · Unknown · Automapper
Skdishansachin
·
Published
2026-03-13
·
Updated
2026-03-20
·
CVE-2026-32933
CVSS v3.1
7.5
High
| Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Name of the Vulnerable Software and Affected Versions
AutoMapper versions prior to 15.1.1
AutoMapper versions prior to 16.1.1
Description
AutoMapper is susceptible to a Denial of Service (DoS) attack. When processing deeply nested object graphs, the library employs recursive method calls without a default maximum depth limit. An attacker can exploit this by providing a specifically crafted object graph that exhausts the thread's stack memory, resulting in a
StackOverflowException and terminating the application process. The core mapping engine is affected, where recursive attempts to map nested objects of the same type can exceed the stack size, leading to process termination. A proof of concept demonstrates the crash by creating a deeply nested "Circular" object graph and attempting to map it.Recommendations
AutoMapper versions prior to 15.1.1: Implement a default
MaxDepth for all mapping operations.
AutoMapper versions prior to 16.1.1: Implement a default MaxDepth for all mapping operations.Exploit
Fix
DoS
Uncontrolled Recursion
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Automapper