Description
A flaw has been found in Alfresco Activiti up to 7.19/8.8.0. Affected by this issue is the function deserialize/createObjectInputStream of the file activiti-core/activiti-engine/src/main/java/org/activiti/engine/impl/variable/SerializableType.java of the component Process Variable Serialization System. This manipulation causes deserialization. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-12
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Deserialization (Potential RCE)
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the Process Variable Serialization System of Alfresco Activiti, specifically the deserialize/createObjectInputStream method in SerializableType.java. An attacker can craft malicious serialized data that triggers the Java deserialization routine, which is marked as a flaw that allows remote exploitation. Based on the description, it is inferred that the flaw could enable remote code execution or other destructive actions on the host. The weakness is rooted in improper input validation and deserialization of untrusted data, aligning with CWE‑20 and CWE‑502.

Affected Systems

Vendors affected include Alfresco: Activiti. The flaw is present in all releases up to version 7.19 and 8.8.0, inclusive. No affected version information beyond those in the CNAs is provided, so any deployment earlier than 7.20 or 8.8.1 should be considered vulnerable.

Risk and Exploitability

The CVSS score is 5.3 (Medium) with an EPSS score of less than 1% and no listing in the KEV catalog, which suggests a modest but non‑negligible risk. However, the description explicitly states that the exploit has been published and may be used, indicating that the vulnerability is actively exploited in the wild at a low probability. The attack vector is remote, presumably via ingestion of malicious process variables, and requires no local privileges.

Generated by OpenCVE AI on March 18, 2026 at 15:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Alfresco Activiti release that is newer than 7.19 or 8.8.0 to eliminate the known deserialization flaw.

Generated by OpenCVE AI on March 18, 2026 at 15:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Alfresco
Alfresco activiti
Vendors & Products Alfresco
Alfresco activiti

Thu, 12 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Alfresco Activiti up to 7.19/8.8.0. Affected by this issue is the function deserialize/createObjectInputStream of the file activiti-core/activiti-engine/src/main/java/org/activiti/engine/impl/variable/SerializableType.java of the component Process Variable Serialization System. This manipulation causes deserialization. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Alfresco Activiti Process Variable Serialization System SerializableType.java createObjectInputStream deserialization
Weaknesses CWE-20
CWE-502
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Alfresco Activiti
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-12T13:26:26.778Z

Reserved: 2026-03-11T13:36:15.186Z

Link: CVE-2026-3967

cve-icon Vulnrichment

Updated: 2026-03-12T13:26:23.045Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-12T00:16:12.477

Modified: 2026-03-12T21:07:53.427

Link: CVE-2026-3967

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:36:23Z

Weaknesses