Follow @Openwall on Twitter for new release announcements and other news
[<prev] [day] [month] [year] [list]
Message-ID: <CALJOYLGnFQLUmqHS-L9tCuJSQsJr=0yvvYd5CgWyxyqf1Wn8yg@mail.gmail.com>
Date: Wed, 19 Nov 2025 08:25:54 +0000
From: Dan Haywood <danhaywood@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2025-64408: Apache Causeway: Java deserialization vulnerability
 to authenticated attackers

Severity: critical

Affected versions:

- Apache Causeway (org.apache.causeway:*) 2.0.0 through 3.4.0
- Apache Causeway (org.apache.causeway:*) 4.0.0-M1

Description:

Apache Causeway faces Java deserialization vulnerabilities that allow
remote code execution (RCE) through user-controllable URL parameters.
These vulnerabilities affect all applications using Causeway's
ViewModel functionality and can be exploited by authenticated
attackers to execute arbitrary code with application privileges.

This issue affects all current versions.

Users are recommended to upgrade to version 3.5.0, which fixes the issue.

This issue is being tracked as CAUSEWAY-3939

Credit:

Slain Nico (reporter)

References:
https://causeway.apache.org/https://www.cve.org/CVERecord?id=CVE-2025-64408https://issues.apache.org/jira/browse/CAUSEWAY-3939

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.