Users are recommended to upgrade to the latest version, which fixes the issue.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6x49-w35h-wqrj | Bypass serialize checks in Apache Dubbo |
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 13 Feb 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A deserialization vulnerability existed when decode a malicious package.This issue affects Apache Dubbo: from 3.1.0 through 3.1.10, from 3.2.0 through 3.2.4. Users are recommended to upgrade to the latest version, which fixes the issue. | A deserialization vulnerability existed when decode a malicious package.This issue affects Apache Dubbo: from 3.1.0 through 3.1.10, from 3.2.0 through 3.2.4. Users are recommended to upgrade to the latest version, which fixes the issue. |
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-13T16:49:03.349Z
Reserved: 2023-04-04T09:31:05.236Z
Link: CVE-2023-29234
No data.
Status : Modified
Published: 2023-12-15T09:15:07.380
Modified: 2025-02-13T17:16:18.023
Link: CVE-2023-29234
No data.
OpenCVE Enrichment
No data.
Github GHSA