YAML 2.8.3 Security Update Patches Critical Stack Overflow Vulnerability (CVE-2026-33532)
A critical security vulnerability in the widely-used `yaml` JavaScript library has been patched, exposing countless Node.js projects to potential denial-of-service attacks. The flaw, tracked as CVE-2026-33532, stems from a recursive function in the library's node resolution/composition phase that lacks a depth bound. An attacker can exploit this by crafting a malicious YAML document, causing the parser to throw a RangeError due to a stack overflow, effectively crashing the application.
The vulnerability was addressed in version 2.8.3 of the `yaml` package, released by maintainer Eemeli. The update is now being pushed through automated dependency management systems like Renovate, as seen in a recent pull request titled 'chore: Update pnpm catalog to 2.8.3 [SECURITY]'. The advisory warns that parsing a specially crafted YAML document with the vulnerable versions (prior to 2.8.3) may trigger the stack overflow.
Given `yaml`'s foundational role in configuration parsing for countless applications, services, and development tools, this vulnerability presents a significant supply chain risk. The silent, automated nature of the fix—buried in a routine dependency update—underscores the hidden pressures on maintainers and the critical importance of monitoring security advisories. Projects that have not yet updated their `yaml` dependency to version 2.8.3 or later remain exposed to this denial-of-service vector.