Skip to content
Threat Feed

Tag

Deserialization

18 briefs RSS
critical advisory

Hyperledger Fabric SDK Java Deserialization RCE

The deprecated fabric-sdk-java client SDK is vulnerable to Java deserialization RCE due to the use of ObjectInputStream.readObject() without an ObjectInputFilter in Channel.java, allowing remote code execution if an attacker can supply crafted serialized Channel bytes to the client application.

fabric-sdk-java deserialization rce java
2r 1t
critical advisory

Apache MINA Arbitrary Code Execution Vulnerability

A critical arbitrary code execution vulnerability (CVE-2026-41635) exists in Apache MINA versions 2.0.0 through 2.0.27, 2.1.0 through 2.1.10, and 2.2.0 through 2.2.5 due to missing class validation in the AbstractIoBuffer.resolveClass() method, potentially allowing attackers to execute arbitrary code on applications using Apache MINA.

MINA 2.0 +2 apache-mina rce deserialization cve-2026-41635
2r 1t 1c
critical advisory

ERB Deserialization Bypass via def_module/def_method/def_class

A deserialization vulnerability exists in Ruby ERB versions before 4.0.3.1, version 4.0.4, ERB versions 5.0.0 before 6.0.1.1, and ERB versions 6.0.2 before 6.0.4. The `@_init` instance variable guard in `ERB#result` and `ERB#run` can be bypassed via `ERB#def_module`, `ERB#def_method`, and `ERB#def_class`, allowing arbitrary code execution when an ERB object is reconstructed via `Marshal.load` on untrusted data.

ERB deserialization rce ruby rails
2r 2t 1c
critical advisory

Ray Data Remote Code Execution via Parquet Arrow Extension Type Deserialization

Ray Data is vulnerable to remote code execution via Parquet Arrow Extension Type Deserialization; specifically, a maliciously crafted Parquet file can trigger arbitrary code execution due to the unsafe deserialization of Arrow extension metadata, affecting Ray versions 2.49.0 through 2.54.0.

Ray Data remote-code-execution parquet deserialization cloudpickle ray
2r 1t
critical advisory

Insecure Deserialization Vulnerability in Telerik UI for AJAX RadFilter Control (CVE-2026-6023)

An insecure deserialization vulnerability exists in Progress Telerik UI for AJAX's RadFilter control (versions 2024.4.1114 through 2026.1.421) allowing remote code execution via tampering with the filter state exposed to the client.

cve-2026-6023 telerik deserialization rce webserver
2r 1t 1c
high advisory

MetaSlider Responsive Slider Plugin Deserialization Vulnerability (CVE-2026-39467)

A deserialization of untrusted data vulnerability in the MetaSlider Responsive Slider plugin for WordPress (versions up to 3.106.0) allows for unauthenticated object injection, potentially leading to remote code execution.

wordpress object-injection deserialization cve-2026-39467
2r 1t 1c
critical advisory

Critical Remote Code Execution Vulnerability in Talend JobServer and Talend Runtime

CVE-2026-6264, a critical deserialization vulnerability in Talend JobServer and Runtime, allows unauthenticated remote code execution via the JMX monitoring port, leading to complete system compromise.

rce deserialization talend
2r 2t 1c
high advisory

Azure Monitor Agent Deserialization Vulnerability (CVE-2026-32192) Allows Local Privilege Escalation

CVE-2026-32192 allows a locally authorized attacker to escalate privileges on a host running the Azure Monitor Agent via deserialization of untrusted data.

cve-2026-32192 azure monitor agent privilege escalation deserialization
2r 1t 1c
critical advisory

Red Hat Quay Deserialization Vulnerability Leads to Remote Code Execution (CVE-2026-32590)

CVE-2026-32590 describes a deserialization vulnerability in Red Hat Quay's handling of resumable container image layer uploads, potentially allowing an attacker to execute arbitrary code on the Quay server by tampering with intermediate data stored in the database.

cve-2026-32590 redhat-quay deserialization rce
2r 2t 1c
critical advisory

IBM Langflow Desktop Deserialization RCE (CVE-2026-3357)

IBM Langflow Desktop versions 1.6.0 through 1.8.2 is vulnerable to arbitrary code execution due to insecure deserialization of untrusted data, allowing an authenticated user to execute code on the system.

cve-2026-3357 deserialization rce langflow
2r 1t 1c
high advisory

NVIDIA DALI Deserialization Vulnerability (CVE-2026-24156)

NVIDIA DALI contains a deserialization of untrusted data vulnerability, identified as CVE-2026-24156, which may lead to arbitrary code execution.

cve-2026-24156 deserialization nvidia dali
2r 2t 1c 1i
critical advisory

phpBB Arbitrary File Upload Vulnerability (CVE-2019-25685)

phpBB is vulnerable to arbitrary file upload (CVE-2019-25685) by exploiting the plupload functionality and phar:// stream wrapper, allowing authenticated attackers to upload crafted zip files containing serialized PHP objects that execute arbitrary code via the imagick parameter.

phpBB file-upload deserialization CVE-2019-25685
2r 1c
critical advisory

pyLoad Arbitrary Code Execution via Malicious Session Deserialization

pyLoad is vulnerable to arbitrary code execution via an unprotected `storage_folder` configuration option, allowing an attacker with `SETTINGS` and `ADD` permissions to write a malicious pickle payload to the Flask session store and execute arbitrary code upon subsequent HTTP requests.

pyLoad rce pickle deserialization webserver
2r 4t 1c 2i
high advisory

NVIDIA BioNeMo Deserialization Vulnerability (CVE-2026-24164)

NVIDIA BioNeMo is vulnerable to deserialization of untrusted data (CVE-2026-24164), potentially leading to code execution, denial of service, information disclosure, and data tampering.

cve deserialization nvidia
2r 1t 1c 1i
critical advisory

Active Exploitation of SharePoint Deserialization Vulnerability (CVE-2026-20963)

CVE-2026-20963, a SharePoint deserialization vulnerability, is under active exploitation and has been added to the CISA Known Exploited Vulnerabilities (KEV) catalog, requiring immediate patching and auditing of potentially compromised data.

CVE-2026-20963 sharepoint deserialization cisa-kev
2r 1t 1i
critical advisory

PhpSpreadsheet SSRF and RCE Vulnerability via IOFactory::load

PhpSpreadsheet is vulnerable to Server-Side Request Forgery (SSRF) and Remote Code Execution (RCE) due to improper validation of filenames in the IOFactory::load function, exploitable via PHP wrappers like `phar://` and `ftp://`.

PhpSpreadsheet ssrf rce php deserialization
2r 2t
high advisory

xmldom XML Node Injection via Comment Serialization

The xmldom library is vulnerable to XML node injection, allowing attackers to inject arbitrary XML nodes into serialized output by manipulating comment content; this is mitigated by using the `requireWellFormed` option in `serializeToString` after upgrading to version 0.8.13 or 0.9.10.

xmldom xml injection deserialization vulnerability
2r 1t
critical advisory

Pipecat Remote Code Execution via Pickle Deserialization in LivekitFrameSerializer

A critical vulnerability, CVE-2025-62373, exists in Pipecat's LivekitFrameSerializer where the deserialize() method uses Python's pickle.loads() on WebSocket data without validation, allowing a malicious WebSocket client to execute arbitrary code on the Pipecat server if LivekitFrameSerializer is explicitly enabled.

pipecat-ai remote code execution deserialization pipecat
2r 1t 1c 1i