TopVuln

High-risk vulnerability digests

CVE-2026-41635

  • CRITICAL

OESA-2026-2168 apache-mina security update

Details

CVSS v3
9.8
NVD published
2026-04-27 09:16:01
EPSS
0.1% probability · 32.9th percentile — 2026-05-12
Affected versions
Apache MINA 2.0.0 <= 2.0.27, 2.1.0 <= 2.1.10, 2.2.0 <= 2.2.5
Summary
The resolveClass() method in Apache MINA AbstractIoBuffer lacks proper class validation for static classes and primitive types, allowing attackers to bypass the existing classname allowlist. This flaw enables arbitrary code execution when an application uses the vulnerable IoBuffer.getObject() method. All unpatched affected versions are exposed to remote exploitation by malicious actors.
Remediation
Upgrade Apache MINA to the patched versions 2.0.28, 2.1.11, or 2.2.6 immediately. If an immediate upgrade is not possible, restrict access to applications that call IoBuffer.getObject() and block untrusted input to vulnerable endpoints.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.