AutoMapper is a convention-based object-object mapper in .NET. Versions prior to 15.1.1 and 16.1.1 are vulnerable to a Denial of Service (DoS) attack. When mapping deeply nested object graphs, the library uses recursive method calls without enforcing a default maximum depth limit. This allows an attacker to provide a specially crafted object graph that exhausts the thread's stack memory, triggering a `StackOverflowException` and causing the entire application process to terminate. Versions 15.1.1 and 16.1.1 fix the issue.

Project Subscriptions

Vendors Products
Luckypennysoftware Subscribe
Automapper Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rvv3-g6hj-g44x AutoMapper Vulnerable to Denial of Service (DoS) via Uncontrolled Recursion
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 20 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Luckypennysoftware
Luckypennysoftware automapper
Vendors & Products Luckypennysoftware
Luckypennysoftware automapper

Fri, 20 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Description AutoMapper is a convention-based object-object mapper in .NET. Versions prior to 15.1.1 and 16.1.1 are vulnerable to a Denial of Service (DoS) attack. When mapping deeply nested object graphs, the library uses recursive method calls without enforcing a default maximum depth limit. This allows an attacker to provide a specially crafted object graph that exhausts the thread's stack memory, triggering a `StackOverflowException` and causing the entire application process to terminate. Versions 15.1.1 and 16.1.1 fix the issue.
Title AutoMapper Vulnerable to Denial of Service (DoS) via Uncontrolled Recursion
Weaknesses CWE-674
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-20T20:02:58.558Z

Reserved: 2026-03-17T00:05:53.282Z

Link: CVE-2026-32933

cve-icon Vulnrichment

Updated: 2026-03-20T20:02:54.190Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-20T03:16:00.430

Modified: 2026-03-20T13:37:50.737

Link: CVE-2026-32933

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T10:37:46Z

Weaknesses