CVE-2026-7584

HIGH

Arbitrary Code Execution via Unsafe Deserialization in LabOne Q

Title source: cna
STIX 2.1

Description

The LabOne Q serialization framework uses a class-loading mechanism (import_cls) to dynamically import and instantiate Python classes during deserialization. Prior to the fix, this mechanism accepted arbitrary fully-qualified class names from the serialized data without any validation of the target class or restriction on which modules could be imported. An attacker can craft a serialized experiment file that causes the deserialization engine to import and instantiate arbitrary Python classes with attacker-controlled constructor arguments, resulting in arbitrary code execution in the context of the user running the Python process. Exploitation requires the victim to load a malicious file using LabOne Q's deserialization functions, for example a compromised experiment file shared for collaboration or support purposes.

Scores

CVSS v3 7.8
EPSS 0.0002
EPSS Percentile 5.6%
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-502
Status published
Products (2)
Zurich Instruments/LabOne Q 2.41.0 - 26.1.2
Zurich Instruments/LabOne Q 26.4.0b1 - 26.4.0b5
Published May 01, 2026
Tracked Since May 01, 2026