Apache Causeway faces Java deserialization vulnerabilities that allow remote code execution (RCE) through user-controllable URL parameters. These vulnerabilities affect all applications using Causeway's ViewModel functionality and can be exploited by authenticated attackers to execute arbitrary code with application privileges.  This issue affects all current versions. Users are recommended to upgrade to version 3.5.0, which fixes the issue.
History

Thu, 20 Nov 2025 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache causeway
Vendors & Products Apache
Apache causeway

Wed, 19 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 19 Nov 2025 12:30:00 +0000

Type Values Removed Values Added
References

Wed, 19 Nov 2025 10:45:00 +0000

Type Values Removed Values Added
Description Apache Causeway faces Java deserialization vulnerabilities that allow remote code execution (RCE) through user-controllable URL parameters. These vulnerabilities affect all applications using Causeway's ViewModel functionality and can be exploited by authenticated attackers to execute arbitrary code with application privileges.  This issue affects all current versions. Users are recommended to upgrade to version 3.5.0, which fixes the issue.
Title Apache Causeway: Java deserialization vulnerability to authenticated attackers
Weaknesses CWE-502
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2025-11-19T10:32:05.808Z

Updated: 2025-11-20T04:55:22.650Z

Reserved: 2025-11-03T17:08:27.439Z

Link: CVE-2025-64408

cve-icon Vulnrichment

Updated: 2025-11-19T12:08:21.438Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-19T11:15:47.790

Modified: 2025-11-19T19:14:59.327

Link: CVE-2025-64408

cve-icon Redhat

No data.