A remote code execution vulnerability exists where a malicious Raft node can exploit insecure Hessian deserialization within the PD store. The fix enforces IP-based authentication to restrict cluster membership and implements a strict class whitelist to harden the Hessian serialization process against object injection attacks.




Users are recommended to upgrade to version 1.7.0, which fixes the issue.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 12 Dec 2025 10:30:00 +0000

Type Values Removed Values Added
References

Fri, 12 Dec 2025 09:45:00 +0000

Type Values Removed Values Added
Description A remote code execution vulnerability exists where a malicious Raft node can exploit insecure Hessian deserialization within the PD store. The fix enforces IP-based authentication to restrict cluster membership and implements a strict class whitelist to harden the Hessian serialization process against object injection attacks. Users are recommended to upgrade to version 1.7.0, which fixes the issue.
Title Apache HugeGraph-Server: RAFT and deserialization vulnerability
Weaknesses CWE-502
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-12-12T10:06:16.452Z

Reserved: 2025-02-17T10:32:01.997Z

Link: CVE-2025-26866

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-12T10:15:49.053

Modified: 2025-12-12T10:15:49.053

Link: CVE-2025-26866

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses