Report: CVE-2026-7584 - Arbitrary Code Execution via Unsafe Deserialization in LabOne Q - Analysis

Report: CVE-2026-7584 - Arbitrary Code Execution via Unsafe Deserialization in LabOne Q - Analysis

CVE ID :CVE-2026-7584 Published : May 1, 2026, 8:16 a.m. | 1 hour, 11 minutes ago Description :The LabOne Q serialization framework uses a class-loading mechanism (import_cls) to dynamically import and instantiate Python classes during deserialization. Prior to the fix, this mechanism accepted arbitrary fully-qualified class names from the serialized data without any validation of the target class or restriction on which modules could be imported. An attacker can craft a serialized experiment file that causes the deserialization engine to import and instantiate arbitrary Python classes with attacker-controlled constructor arguments, resulting in arbitrary code execution in the context of the user running the Python process. Exploitation requires the victim to load a malicious file using LabOne Q's deserialization functions, for example a compromised experiment file shared for collaboration or support purposes. Severity: 8.4 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Severity
HIGH
Published
May 1, 2026
Affected Product: Python
Impact: code execution