Home

Description

Apache Causeway faces Java deserialization vulnerabilities that allow remote code execution (RCE) through user-controllable URL parameters. These vulnerabilities affect all applications using Causeway's ViewModel functionality and can be exploited by authenticated attackers to execute arbitrary code with application privileges.  This issue affects all current versions. Users are recommended to upgrade to version 3.5.0, which fixes the issue.

PUBLISHED Reserved 2025-11-03 | Published 2025-11-19 | Updated 2025-11-20 | Assigner apache

Problem types

CWE-502 Deserialization of Untrusted Data

Product status

Default status
unaffected

2.0.0 (semver)
affected

4.0.0-M1 (semver)
affected

Credits

Slain Nico reporter

References

www.openwall.com/lists/oss-security/2025/11/19/1

lists.apache.org/thread/rjlg4spqhmgy1xgq9wq5h2tfnq4pm70b vendor-advisory

cve.org (CVE-2025-64408)

nvd.nist.gov (CVE-2025-64408)

Download JSON