This issue affects Apache DolphinScheduler:
Version >= 3.2.0 and < 3.3.1.
Attackers who can access the Master or Worker nodes can compromise the system by creating a StandardRpcRequest, injecting a malicious class type into it, and sending RPC requests to the DolphinScheduler Master/Worker nodes.
Users are recommended to upgrade to version [3.3.1], which fixes the issue.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-f786-9c63-8xr8 | Apache DolphinScheduler RPC module has a Deserialization of Untrusted Data vulnerability |
Mon, 27 Apr 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache dolphinscheduler |
|
| CPEs | cpe:2.3:a:apache:dolphinscheduler:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache
Apache dolphinscheduler |
Fri, 24 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 24 Apr 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 24 Apr 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Deserialization of Untrusted Data vulnerability in Apache DolphinScheduler RPC module. This issue affects Apache DolphinScheduler: Version >= 3.2.0 and < 3.3.1. Attackers who can access the Master or Worker nodes can compromise the system by creating a StandardRpcRequest, injecting a malicious class type into it, and sending RPC requests to the DolphinScheduler Master/Worker nodes. Users are recommended to upgrade to version [3.3.1], which fixes the issue. | |
| Title | Apache DolphinScheduler: Deserialization of untrusted data in RPC | |
| Weaknesses | CWE-502 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2026-04-24T16:09:59.535Z
Reserved: 2025-10-09T12:40:17.778Z
Link: CVE-2025-62233
Updated: 2026-04-24T11:28:22.000Z
Status : Analyzed
Published: 2026-04-24T11:16:21.780
Modified: 2026-04-27T13:45:44.713
Link: CVE-2025-62233
No data.
OpenCVE Enrichment
Updated: 2026-04-28T07:00:09Z
Github GHSA