Home

Description

An issue was discovered in Cista v0.15 and below. Insecure deserialization of untrusted input under certain conditions may lead to leaking of stack/heap addresses which may be used to bypass ASLR. Classes with pointer-like mechanics under the cista::raw namespace are prone to reference tampering, where Cista does not perform sufficient checks to safeguard against self-referencing pointers and referencing other data within the payload. The leak occurs if the deserialized values are observable by the attacker.

PUBLISHED Reserved 2025-09-26 | Published 2026-04-28 | Updated 2026-04-28 | Assigner mitre




MEDIUM: 5.3CVSS:3.1/AC:L/AV:N/A:N/C:L/I:N/PR:N/S:U/UI:N

References

gist.github.com/TrebledJ/66cc0ed37bdb3e70ce0ef98396790771 exploit

cista.com

gist.github.com/TrebledJ/66cc0ed37bdb3e70ce0ef98396790771

cve.org (CVE-2025-60887)

nvd.nist.gov (CVE-2025-60887)

Download JSON