Apache Causeway faces Java deserialization vulnerabilities that allow remote code execution (RCE) through user-controllable URL parameters. These vulnerabilities affect all applications using Causeway's ViewModel functionality and can be exploited by authenticated attackers to execute arbitrary code with application privileges. 

This issue affects all current versions.

Users are recommended to upgrade to version 3.5.0, which fixes the issue.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 19 Nov 2025 12:30:00 +0000

Type Values Removed Values Added
References

Wed, 19 Nov 2025 10:45:00 +0000

Type Values Removed Values Added
Description Apache Causeway faces Java deserialization vulnerabilities that allow remote code execution (RCE) through user-controllable URL parameters. These vulnerabilities affect all applications using Causeway's ViewModel functionality and can be exploited by authenticated attackers to execute arbitrary code with application privileges.  This issue affects all current versions. Users are recommended to upgrade to version 3.5.0, which fixes the issue.
Title Apache Causeway: Java deserialization vulnerability to authenticated attackers
Weaknesses CWE-502
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-11-19T12:08:21.438Z

Reserved: 2025-11-03T17:08:27.439Z

Link: CVE-2025-64408

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-11-19T11:15:47.790

Modified: 2025-11-19T12:15:49.790

Link: CVE-2025-64408

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.