Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 29 Apr 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cista
Cista cista |
|
| Vendors & Products |
Cista
Cista cista |
Wed, 29 Apr 2026 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Cista Vulnerability: Insecure Deserialization Enables Memory Address Disclosure and ASLR Bypass |
Tue, 28 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-502 | |
| Metrics |
ssvc
|
Tue, 28 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in Cista v0.15 and below. Insecure deserialization of untrusted input under certain conditions may lead to leaking of stack/heap addresses which may be used to bypass ASLR. Classes with pointer-like mechanics under the cista::raw namespace are prone to reference tampering, where Cista does not perform sufficient checks to safeguard against self-referencing pointers and referencing other data within the payload. The leak occurs if the deserialized values are observable by the attacker. | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-28T16:30:20.600Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-60887
Updated: 2026-04-28T16:26:59.610Z
Status : Deferred
Published: 2026-04-28T16:16:05.597
Modified: 2026-04-28T20:18:13.020
Link: CVE-2025-60887
No data.
OpenCVE Enrichment
Updated: 2026-04-29T10:11:08Z