CWE-502 Deserialization of Untrusted Data at the eventmesh-meta-raft plugin module in Apache EventMesh master branch without release version on windows\linux\mac os e.g. platforms allows attackers to send controlled message and remote code execute via hessian deserialization rpc protocol. Users can use the code under the master branch in project repo or version 1.11.0 to fix this issue.
History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00118}

epss

{'score': 0.00411}


Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0008}

epss

{'score': 0.00118}


Mon, 14 Jul 2025 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache eventmesh
CPEs cpe:2.3:a:apache:eventmesh:*:*:*:*:*:*:*:*
Vendors & Products Apache
Apache eventmesh

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00097}

epss

{'score': 0.0008}


Tue, 18 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 14 Feb 2025 17:30:00 +0000

Type Values Removed Values Added
References

Fri, 14 Feb 2025 13:45:00 +0000

Type Values Removed Values Added
Description CWE-502 Deserialization of Untrusted Data at the eventmesh-meta-raft plugin module in Apache EventMesh master branch without release version on windows\linux\mac os e.g. platforms allows attackers to send controlled message and remote code execute via hessian deserialization rpc protocol. Users can use the code under the master branch in project repo or version 1.11.0 to fix this issue.
Title Apache EventMesh: raft Hessian Deserialization Vulnerability allowing remote code execution
Weaknesses CWE-502
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2025-02-14T13:34:26.600Z

Updated: 2025-02-18T15:10:16.650Z

Reserved: 2024-12-18T07:46:43.781Z

Link: CVE-2024-56180

cve-icon Vulnrichment

Updated: 2025-02-14T17:02:37.296Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-14T14:15:32.267

Modified: 2025-07-14T13:07:40.770

Link: CVE-2024-56180

cve-icon Redhat

No data.