Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jm7w-5684-pvh8 | FASTJSON Includes Functionality from Untrusted Control Sphere |
Mon, 12 Jan 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | fastjson: From CVEorg collector | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 09 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Fri, 09 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 09 Jan 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Alibaba
Alibaba fastjson |
|
| Vendors & Products |
Alibaba
Alibaba fastjson |
Fri, 09 Jan 2026 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Fastjson before 1.2.48 mishandles autoType because, when an @type key is in a JSON document, and the value of that key is the name of a Java class, there may be calls to certain public methods of that class. Depending on the behavior of those methods, there may be JNDI injection with an attacker-supplied payload located elsewhere in that JSON document. This was exploited in the wild in 2023 through 2025. NOTE: this issue exists because of an incomplete fix for CVE-2017-18349. Also, a later bypass is covered by CVE-2022-25845. | |
| Weaknesses | CWE-829 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-09T21:37:10.756Z
Reserved: 2026-01-09T06:43:23.338Z
Link: CVE-2025-70974
Updated: 2026-01-09T19:08:04.762Z
Status : Deferred
Published: 2026-01-09T07:16:02.677
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-70974
OpenCVE Enrichment
Updated: 2026-01-09T13:23:42Z
Github GHSA