Users are recommended to upgrade to version 1.7.0, which fixes the issue.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-q37j-3367-fwv7 | Apache HugeGraph-Server: RAFT and deserialization vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 29 Dec 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache hugegraph
|
|
| CPEs | cpe:2.3:a:apache:hugegraph:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache hugegraph
|
Sun, 14 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache hugegraph-server |
|
| Vendors & Products |
Apache
Apache hugegraph-server |
Fri, 12 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 12 Dec 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 12 Dec 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A remote code execution vulnerability exists where a malicious Raft node can exploit insecure Hessian deserialization within the PD store. The fix enforces IP-based authentication to restrict cluster membership and implements a strict class whitelist to harden the Hessian serialization process against object injection attacks. Users are recommended to upgrade to version 1.7.0, which fixes the issue. | |
| Title | Apache HugeGraph-Server: RAFT and deserialization vulnerability | |
| Weaknesses | CWE-502 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-12-13T04:55:17.667Z
Reserved: 2025-02-17T10:32:01.997Z
Link: CVE-2025-26866
Updated: 2025-12-12T10:06:16.452Z
Status : Analyzed
Published: 2025-12-12T10:15:49.053
Modified: 2025-12-29T17:20:58.370
Link: CVE-2025-26866
No data.
OpenCVE Enrichment
Updated: 2025-12-14T21:16:22Z
Github GHSA