We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-27528

Apache InLong: JDBC Vulnerability for Invisible Character Bypass Leading to Arbitrary File Read



Description

Deserialization of Untrusted Data vulnerability in Apache InLong. This issue affects Apache InLong: from 1.13.0 through 2.1.0. This vulnerability allows attackers to bypass the security mechanisms of InLong JDBC and leads to arbitrary file reading. Users are advised to upgrade to Apache InLong's 2.2.0 or cherry-pick [1] to solve it. [1] https://github.com/apache/inlong/pull/11747

Reserved 2025-02-27 | Published 2025-05-28 | Updated 2025-05-28 | Assigner apache

Problem types

CWE-502 Deserialization of Untrusted Data

Product status

Default status
unaffected

1.13.0
affected

Credits

yulat finder

m4x finder

h3h3qaq finder

References

lists.apache.org/thread/b807rqzgyv4qgvxw3nhkq8tl6g90gqgj vendor-advisory

github.com/apache/inlong/pull/11747 patch

cve.org (CVE-2025-27528)

nvd.nist.gov (CVE-2025-27528)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-27528

Support options

Helpdesk Chat, Email, Knowledgebase