CWE-502

Deserialization of Untrusted Data

713 CVEs Avg CVSS 8.6 MITRE
286
CRITICAL
347
HIGH
63
MEDIUM
4
LOW
77
POC
24
KEV

Monthly

CVE-2026-6857 HIGH This Week

Remote code execution in Red Hat Apache Camel Infinispan component allows low-privileged attackers to execute arbitrary code via unsafe deserialization in ProtoStream remote aggregation repository. Exploiting this vulnerability requires network access and low-privilege credentials but grants full system compromise affecting confidentiality, integrity, and availability. The attack complexity is rated high (AC:H), suggesting specific configuration or timing requirements. No active exploitation confirmed at time of analysis (not in CISA KEV), and public exploit code status is unknown.

RCE Deserialization
NVD
CVSS 3.1
7.5
CVE-2026-6023 HIGH PATCH This Week

Remote code execution in Progress Telerik UI for ASP.NET AJAX via insecure deserialization in the RadFilter control allows unauthenticated remote attackers to execute arbitrary code on the server by tampering with exposed client-side filter state. Affected versions span 2024.4.1114 through 2026.1.421. EPSS data not available; no public exploit or CISA KEV listing identified at time of analysis. The CVSS 8.1 (High) reflects network accessibility but 'High' attack complexity (AC:H), indicating successful exploitation requires specific conditions beyond simple network access.

RCE Deserialization
NVD
CVSS 3.1
8.1
EPSS
0.3%
CVE-2026-39467 HIGH This Week

PHP object injection in MetaSlider Responsive Slider plugin (WordPress) through version 3.106.0 allows authenticated administrators with high privileges to execute arbitrary code by deserializing untrusted data. The vulnerability requires authenticated high-privilege access (PR:H), limiting exploitation to compromised admin accounts or malicious insiders. EPSS data not available; no confirmed active exploitation or public POC identified at time of analysis.

Deserialization
NVD
CVSS 3.1
7.2
EPSS
0.0%
CVE-2026-25524 PHP HIGH PATCH GHSA This Week

Remote code execution in OpenMage Magento LTS versions prior to 20.17.0 allows unauthenticated attackers to execute arbitrary code by uploading malicious phar archives disguised as images and triggering PHP deserialization via phar:// stream wrappers. The attack requires high complexity (AC:H) to exploit successfully. EPSS data not available, but exploitation requires specific conditions around file upload and path manipulation. Vendor patch available in version 20.17.0, confirmed by GitHub security advisory GHSA-fg79-cr9c-7369.

PHP RCE Deserialization Adobe
NVD GitHub
CVSS 3.1
8.1
EPSS
0.1%
CVE-2026-25917 PyPI HIGH PATCH GHSA This Week

Deserialization vulnerability in Apache Airflow webserver (all versions before 3.2.0) allows network-accessible attackers to execute arbitrary code by injecting malicious XCom payloads, despite vendor-assigned Low severity due to the trusted Dag Author threat model. CVSS 9.8 Critical rating reflects unauthenticated network-based RCE capability (AV:N/PR:N), contradicting the description's trust assumption. EPSS 0.07% (22nd percentile) suggests low immediate exploitation likelihood. No active exploitation confirmed; vendor patch available in version 3.2.0 with public GitHub PR.

RCE Apache Deserialization
NVD GitHub VulDB
CVSS 3.1
7.2
EPSS
0.1%
CVE-2026-40901 HIGH PATCH This Week

DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below ship the legacy velocity-1.7.jar, which pulls in commons-collections-3.2.1.jar containing the InvokerTransformer deserialization gadget chain. Quartz 2.3.2, also bundled in the application, deserializes job data BLOBs from the qrtz_job_details table using ObjectInputStream with no deserialization filter or class allowlist. An authenticated attacker who can write to the Quartz job table, such as through the previously described SQL injection in previewSql, can replace a scheduled job's JOB_DATA with a malicious CommonsCollections6 gadget chain payload. When the Quartz cron trigger fires, the payload is deserialized and executes arbitrary commands as root inside the container, achieving full remote code execution. This issue has been fixed in version 2.10.21.

RCE SQLi Deserialization
NVD GitHub
CVSS 4.0
7.5
EPSS
0.4%
CVE-2025-15610 CRITICAL Act Now

Deserialization of untrusted data vulnerability in OpenText, Inc RightFax on Windows, 64 bit, 32 bit allows Object Injection.This issue affects RightFax: through 25.4.

Deserialization Microsoft
NVD
CVSS 4.0
9.3
EPSS
0.0%
CVE-2026-27303 CRITICAL Act Now

Remote code execution in Adobe Connect versions 12.10 and earlier allows unauthenticated attackers to execute arbitrary code through deserialization of untrusted data. The vulnerability achieves scope change, enabling attackers to break out of the application's security context and impact resources beyond the vulnerable component. Despite the 9.6 CVSS score and total technical impact classification, no active exploitation has been confirmed (SSVC: exploitation=none), and CISA has not added this to the KEV catalog. The attack requires low complexity but does require user interaction (CVSS UI:R), constraining automatic exploitation scenarios.

RCE Deserialization Adobe
NVD
CVSS 3.1
9.6
EPSS
1.5%
CVE-2026-34615 CRITICAL Act Now

Arbitrary code execution affects Adobe Connect through version 12.10 and 2025.3 via deserialization of untrusted data. Remote attackers can execute code in the victim's security context without authentication but require user interaction (UI:R), with scope change enabling cross-boundary impacts. No active exploitation confirmed (SSVC: exploitation=none), though the CVSS score of 9.3 reflects critical severity due to network attack vector, low complexity, and high confidentiality/integrity impact. Adobe has released security bulletin APSB26-37 addressing this vulnerability.

RCE Deserialization Adobe
NVD
CVSS 3.1
9.3
EPSS
1.4%
CVE-2026-32192 HIGH PATCH Exploit Unlikely This Week

Privilege escalation in Azure Monitor Agent versions prior to 1.41.0 exploits insecure deserialization of untrusted data, allowing authenticated local attackers with low privileges to achieve full system compromise (high confidentiality, integrity, and availability impact). CVSS 7.8 severity reflects local attack vector with low complexity and no user interaction required. No public exploit identified at time of analysis, though the vulnerability class (CWE-502) is well-understood and frequently targeted. Microsoft has released patch version 1.41.0 to address this flaw.

Deserialization Microsoft
NVD VulDB
CVSS 3.1
7.8
EPSS
0.4%
CVSS 7.5
HIGH This Week

Remote code execution in Red Hat Apache Camel Infinispan component allows low-privileged attackers to execute arbitrary code via unsafe deserialization in ProtoStream remote aggregation repository. Exploiting this vulnerability requires network access and low-privilege credentials but grants full system compromise affecting confidentiality, integrity, and availability. The attack complexity is rated high (AC:H), suggesting specific configuration or timing requirements. No active exploitation confirmed at time of analysis (not in CISA KEV), and public exploit code status is unknown.

RCE Deserialization
NVD
EPSS 0% CVSS 8.1
HIGH PATCH This Week

Remote code execution in Progress Telerik UI for ASP.NET AJAX via insecure deserialization in the RadFilter control allows unauthenticated remote attackers to execute arbitrary code on the server by tampering with exposed client-side filter state. Affected versions span 2024.4.1114 through 2026.1.421. EPSS data not available; no public exploit or CISA KEV listing identified at time of analysis. The CVSS 8.1 (High) reflects network accessibility but 'High' attack complexity (AC:H), indicating successful exploitation requires specific conditions beyond simple network access.

RCE Deserialization
NVD
EPSS 0% CVSS 7.2
HIGH This Week

PHP object injection in MetaSlider Responsive Slider plugin (WordPress) through version 3.106.0 allows authenticated administrators with high privileges to execute arbitrary code by deserializing untrusted data. The vulnerability requires authenticated high-privilege access (PR:H), limiting exploitation to compromised admin accounts or malicious insiders. EPSS data not available; no confirmed active exploitation or public POC identified at time of analysis.

Deserialization
NVD
EPSS 0% CVSS 8.1
HIGH PATCH This Week

Remote code execution in OpenMage Magento LTS versions prior to 20.17.0 allows unauthenticated attackers to execute arbitrary code by uploading malicious phar archives disguised as images and triggering PHP deserialization via phar:// stream wrappers. The attack requires high complexity (AC:H) to exploit successfully. EPSS data not available, but exploitation requires specific conditions around file upload and path manipulation. Vendor patch available in version 20.17.0, confirmed by GitHub security advisory GHSA-fg79-cr9c-7369.

PHP RCE Deserialization +1
NVD GitHub
EPSS 0% CVSS 7.2
HIGH PATCH This Week

Deserialization vulnerability in Apache Airflow webserver (all versions before 3.2.0) allows network-accessible attackers to execute arbitrary code by injecting malicious XCom payloads, despite vendor-assigned Low severity due to the trusted Dag Author threat model. CVSS 9.8 Critical rating reflects unauthenticated network-based RCE capability (AV:N/PR:N), contradicting the description's trust assumption. EPSS 0.07% (22nd percentile) suggests low immediate exploitation likelihood. No active exploitation confirmed; vendor patch available in version 3.2.0 with public GitHub PR.

RCE Apache Deserialization
NVD GitHub VulDB
EPSS 0% CVSS 7.5
HIGH PATCH This Week

DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below ship the legacy velocity-1.7.jar, which pulls in commons-collections-3.2.1.jar containing the InvokerTransformer deserialization gadget chain. Quartz 2.3.2, also bundled in the application, deserializes job data BLOBs from the qrtz_job_details table using ObjectInputStream with no deserialization filter or class allowlist. An authenticated attacker who can write to the Quartz job table, such as through the previously described SQL injection in previewSql, can replace a scheduled job's JOB_DATA with a malicious CommonsCollections6 gadget chain payload. When the Quartz cron trigger fires, the payload is deserialized and executes arbitrary commands as root inside the container, achieving full remote code execution. This issue has been fixed in version 2.10.21.

RCE SQLi Deserialization
NVD GitHub
EPSS 0% CVSS 9.3
CRITICAL Act Now

Deserialization of untrusted data vulnerability in OpenText, Inc RightFax on Windows, 64 bit, 32 bit allows Object Injection.This issue affects RightFax: through 25.4.

Deserialization Microsoft
NVD
EPSS 2% CVSS 9.6
CRITICAL Act Now

Remote code execution in Adobe Connect versions 12.10 and earlier allows unauthenticated attackers to execute arbitrary code through deserialization of untrusted data. The vulnerability achieves scope change, enabling attackers to break out of the application's security context and impact resources beyond the vulnerable component. Despite the 9.6 CVSS score and total technical impact classification, no active exploitation has been confirmed (SSVC: exploitation=none), and CISA has not added this to the KEV catalog. The attack requires low complexity but does require user interaction (CVSS UI:R), constraining automatic exploitation scenarios.

RCE Deserialization Adobe
NVD
EPSS 1% CVSS 9.3
CRITICAL Act Now

Arbitrary code execution affects Adobe Connect through version 12.10 and 2025.3 via deserialization of untrusted data. Remote attackers can execute code in the victim's security context without authentication but require user interaction (UI:R), with scope change enabling cross-boundary impacts. No active exploitation confirmed (SSVC: exploitation=none), though the CVSS score of 9.3 reflects critical severity due to network attack vector, low complexity, and high confidentiality/integrity impact. Adobe has released security bulletin APSB26-37 addressing this vulnerability.

RCE Deserialization Adobe
NVD
EPSS 0% CVSS 7.8
HIGH PATCH Exploit Unlikely This Week

Privilege escalation in Azure Monitor Agent versions prior to 1.41.0 exploits insecure deserialization of untrusted data, allowing authenticated local attackers with low privileges to achieve full system compromise (high confidentiality, integrity, and availability impact). CVSS 7.8 severity reflects local attack vector with low complexity and no user interaction required. No public exploit identified at time of analysis, though the vulnerability class (CWE-502) is well-understood and frequently targeted. Microsoft has released patch version 1.41.0 to address this flaw.

Deserialization Microsoft
NVD VulDB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy