目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-502 可信数据的反序列化 类漏洞列表 1687

CWE-502 可信数据的反序列化 类弱点 1687 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-502 指反序列化不可信数据漏洞,属于数据验证缺陷。攻击者通过构造恶意序列化对象,在系统反序列化时触发任意代码执行或拒绝服务。开发者应避免直接反序列化外部输入,改用 JSON 等安全格式,或实施严格的类白名单校验与完整性检查,确保反序列化过程仅处理预期类型,从而阻断恶意载荷执行。

MITRE CWE 官方描述
CWE:CWE-502 反序列化不可信数据 (Deserialization of Untrusted Data) 英文:产品在没有充分确保生成的数据有效性的情况下,对不可信数据进行反序列化。
常见影响 (3)
IntegrityModify Application Data, Unexpected State
Attackers can modify unexpected objects or data that was assumed to be safe from modification. Deserialized data or code could be modified without using the provided accessor functions, or unexpected functions could be invoked.
AvailabilityDoS: Resource Consumption (CPU)
If a function is making an assumption on when to terminate, based on a sentry in a string, it could easily never terminate.
OtherVaries by Context
The consequences can vary widely, because it depends on which objects or methods are being deserialized, and how they are used. Making an assumption that the code in the deserialized object is valid is dangerous and can enable exploitation. One example is attackers using gadget chains to perform una…
缓解措施 (5)
Architecture and Design, ImplementationIf available, use the signing/sealing features of the programming language to assure that deserialized data has not been tainted. For example, a hash-based message authentication code (HMAC) could be used to ensure that data has not been modified.
ImplementationWhen deserializing data, populate a new object rather than just deserializing. The result is that the data flows through safe input validation and that the functions are safe.
ImplementationExplicitly define a final object() to prevent deserialization.
Architecture and Design, ImplementationMake fields transient to protect them from deserialization. An attempt to serialize and then deserialize a class containing transient fields will result in NULLs where the transient data should be. This is an excellent way to prevent time, environment-based, or sensitive variables from being carried over and used improperly.
ImplementationAvoid having unnecessary types or gadgets (a sequence of instances and method invocations that can self-execute during the deserialization process, often found in libraries) available that can be leveraged for malicious ends. This limits the potential for unintended or unauthorized types and gadgets to be leveraged by the attacker. Add only acceptable classes to an allowlist. Note: new gadgets are…
代码示例 (2)
This code snippet deserializes an object from a file and uses it as a UI button:
try { File file = new File("object.obj"); ObjectInputStream in = new ObjectInputStream(new FileInputStream(file)); javax.swing.JButton button = (javax.swing.JButton) in.readObject(); in.close(); }
Bad · Java
private final void readObject(ObjectInputStream in) throws java.io.IOException { throw new java.io.IOException("Cannot be deserialized"); }
Good · Java
In Python, the Pickle library handles the serialization and deserialization processes. In this example derived from [REF-467], the code receives and parses data, and afterwards tries to authenticate a user based on validating a token.
try { class ExampleProtocol(protocol.Protocol): def dataReceived(self, data): # Code that would be here would parse the incoming data # After receiving headers, call confirmAuth() to authenticate def confirmAuth(self, headers): try: token = cPickle.loads(base64.b64decode(headers['AuthToken'])) if not check_hmac(token['signature'], token['data'], getSecretKey()): raise AuthFail self.secure_data = token['data'] except: raise AuthFail }
Bad · Python
CVE ID标题CVSS风险等级Published
CVE-2026-44126 某软件 某版本 反序列化漏洞 — Secure Email Gateway--2026-05-08
CVE-2026-5127 WordPress User Frontend <=4.3.1 认证用户PHP对象注入漏洞 — User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registration 8.8 High2026-05-08
CVE-2026-41586 fabric-sdk-java ObjectInputStream反序列化漏洞 — fabric--2026-05-07
CVE-2026-34084 PhpSpreadsheet SSRF与远程代码执行漏洞 — PhpSpreadsheet--2026-05-05
CVE-2026-7712 MindsDB pickle反序列化漏洞 — MindsDB 6.3 Medium2026-05-03
CVE-2026-7647 Profile Builder Pro <= 3.14.5 未授权 PHP 对象注入漏洞 — Profile Builder Pro 8.1 High2026-05-02
CVE-2026-7597 mem0ai mem0 faiss.py pickle.dump反序列化漏洞 — mem0 6.3 Medium2026-05-01
CVE-2026-42778 Apache MINA 不受信数据反序列化漏洞 — Apache MINA 9.8 Critical2026-05-01
CVE-2026-42779 Apache MINA AbstractIoBuffer空类分支绕过反序列化远程代码执行漏洞 — Apache MINA 9.8 Critical2026-05-01
CVE-2026-7584 LabOne Q 任意代码执行漏洞 — LabOne Q 7.8 High2026-05-01
CVE-2026-7317 Grav CMS 输入验证错误漏洞 — CMS 5.0 Medium2026-04-28
CVE-2026-24186 NVIDIA FLARE SDK 代码问题漏洞 — FLARE SDK 8.8 High2026-04-28
CVE-2026-27172 Apache Camel 代码问题漏洞 — Apache Camel 8.8AIHighAI2026-04-27
CVE-2026-33454 Apache Camel 代码问题漏洞 — Apache Camel 9.1AICriticalAI2026-04-27
CVE-2026-40858 Apache Camel 代码问题漏洞 — Apache Camel 8.8AIHighAI2026-04-27
CVE-2026-41409 Apache MINA 代码问题漏洞 — Apache MINA 9.8 Critical2026-04-27
CVE-2026-41635 Apache MINA 代码问题漏洞 — Apache MINA 9.8 Critical2026-04-27
CVE-2026-40860 Apache Camel 代码问题漏洞 — Apache Camel 9.8AICriticalAI2026-04-27
CVE-2026-40048 Apache Camel 代码问题漏洞 — Apache Camel PQC 8.8AIHighAI2026-04-27
CVE-2026-40473 Apache Camel 代码问题漏洞 — Apache Camel Mina 9.8AICriticalAI2026-04-27
CVE-2025-62233 Apache DolphinScheduler 代码问题漏洞 — Apache DolphinScheduler 8.8AIHighAI2026-04-24
CVE-2026-33819 Microsoft Bing 代码问题漏洞 — Microsoft Bing 10.0 Critical2026-04-23
CVE-2026-26210 ktransformers 代码问题漏洞 — ktransformers 9.8 Critical2026-04-23
CVE-2026-25874 lerobot 代码问题漏洞 — LeRobot 9.8AICriticalAI2026-04-23
CVE-2025-62373 Pipecat 代码问题漏洞 — pipecat 9.8 Critical2026-04-23
CVE-2026-6857 Apache camel-infinispan 代码问题漏洞 — Red Hat build of Apache Camel 4 for Quarkus 3 7.5 High2026-04-22
CVE-2026-6023 Progress Telerik UI for AJAX 代码问题漏洞 — Telerik UI for ASP.NET AJAX 8.1 High2026-04-22
CVE-2026-39467 WordPress plugin Slider, Gallery, and Carousel by MetaSlider – Image Slider, Video Slider 代码问题漏洞 — Responsive Slider by MetaSlider 7.2 High2026-04-21
CVE-2026-25524 OpenMage Magento Lts(Magento) 安全漏洞 — magento-lts 8.1 High2026-04-20
CVE-2026-25917 Apache Airflow 安全漏洞 — Apache Airflow 9.8AICriticalAI2026-04-18

CWE-502(可信数据的反序列化) 是常见的弱点类别,本平台收录该类弱点关联的 1687 条 CVE 漏洞。