The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-3272 | The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML. |
![]() |
GHSA-92j2-5r7p-6hjw | Restlet is vulnerable to Arbitrary Java Code Execution via crafted XML |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T16:38:01.958Z
Reserved: 2013-06-12T00:00:00
Link: CVE-2013-4221

No data.

Status : Deferred
Published: 2013-10-10T00:55:14.850
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-4221


No data.