|
|
Message-ID: <CALJOYLGnFQLUmqHS-L9tCuJSQsJr=0yvvYd5CgWyxyqf1Wn8yg@mail.gmail.com> Date: Wed, 19 Nov 2025 08:25:54 +0000 From: Dan Haywood <danhaywood@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2025-64408: Apache Causeway: Java deserialization vulnerability to authenticated attackers Severity: critical Affected versions: - Apache Causeway (org.apache.causeway:*) 2.0.0 through 3.4.0 - Apache Causeway (org.apache.causeway:*) 4.0.0-M1 Description: Apache Causeway faces Java deserialization vulnerabilities that allow remote code execution (RCE) through user-controllable URL parameters. These vulnerabilities affect all applications using Causeway's ViewModel functionality and can be exploited by authenticated attackers to execute arbitrary code with application privileges. This issue affects all current versions. Users are recommended to upgrade to version 3.5.0, which fixes the issue. This issue is being tracked as CAUSEWAY-3939 Credit: Slain Nico (reporter) References: https://causeway.apache.org/https://www.cve.org/CVERecord?id=CVE-2025-64408https://issues.apache.org/jira/browse/CAUSEWAY-3939
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.