Soumettre #768942: Activiti <=7.20 or < 8.8.0 Deserializationinformation

TitreActiviti <=7.20 or < 8.8.0 Deserialization
DescriptionA critical remote code execution vulnerability exists in Activiti's process variable serialization system. The application accepts user-controlled Serializable objects via REST or Java APIs, stores them in the database without validation, and subsequently deserializes them using an unrestricted ObjectInputStream. This allows attackers to execute arbitrary code through deserialization gadget chains commonly available in Activiti deployments (Spring Framework, Jakarta Expression Language, Apache Commons Collections).
La source⚠️ https://github.com/AnalogyC0de/public_exp/issues/16
Utilisateur
 Ana10gy (UID 93358)
Soumission27/02/2026 08:00 (il y a 1 mois)
Modérer11/03/2026 14:36 (12 days later)
StatutAccepté
Entrée VulDB350396 [Alfresco Activiti jusqu’à 7.19/8.8.0 Process Variable Serialization System SerializableType.java deserialize/createObjectInputStream élévation de privilèges]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!