Apache Causeway faces Java deserialization vulnerabilities that allow remote code execution (RCE) through user-controllable URL parameters. These vulnerabilities affect all applications using Causeway's ViewModel functionality and can be exploited by authenticated attackers to execute arbitrary code with application privileges.
This issue affects all current versions.
Users are recommended to upgrade to version 3.5.0, which fixes the issue.
This issue affects all current versions.
Users are recommended to upgrade to version 3.5.0, which fixes the issue.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 19 Nov 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 19 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Apache Causeway faces Java deserialization vulnerabilities that allow remote code execution (RCE) through user-controllable URL parameters. These vulnerabilities affect all applications using Causeway's ViewModel functionality and can be exploited by authenticated attackers to execute arbitrary code with application privileges. This issue affects all current versions. Users are recommended to upgrade to version 3.5.0, which fixes the issue. | |
| Title | Apache Causeway: Java deserialization vulnerability to authenticated attackers | |
| Weaknesses | CWE-502 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-11-19T12:08:21.438Z
Reserved: 2025-11-03T17:08:27.439Z
Link: CVE-2025-64408
No data.
Status : Received
Published: 2025-11-19T11:15:47.790
Modified: 2025-11-19T12:15:49.790
Link: CVE-2025-64408
No data.
OpenCVE Enrichment
No data.