Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.mina/mina-core
  4. ›
  5. CVE-2026-41635

CVE-2026-41635: Apache MINA vulnerable to Deserialization of Untrusted Data

April 27, 2026 (updated May 7, 2026)

Apache MINA’s AbstractIoBuffer.resolveClass() contains two branches, one of them (for static classes or primitive types) does not check the class at all, bypassing the classname allowlist and allowing arbitrary code to be executed.

The fix checks if the class is present in the accepted class filter before calling Class.forName().

Affected versions are Apache MINA 2.0.0 <= 2.0.27, 2.1.0 <= 2.1.10, and 2.2.0 <= 2.2.5.

The problem is resolved in Apache MINA 2.0.28, 2.1.11, and 2.2.6 by applying the classname allowlist earlier.

Affected are applications using Apache MINA that call IoBuffer.getObject().

Applications using Apache MINA are advised to upgrade.

References

  • github.com/advisories/GHSA-8297-v2rf-2p32
  • github.com/apache/mina
  • lists.apache.org/thread/1l91w1mqsb3lwfd504fs045ylxntt2tm
  • nvd.nist.gov/vuln/detail/CVE-2026-41635

Code Behaviors & Features

Detect and mitigate CVE-2026-41635 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.0.0 before 2.0.28, all versions starting from 2.1.0 before 2.1.11, all versions starting from 2.2.0 before 2.2.6

Fixed versions

  • 2.0.28
  • 2.1.11
  • 2.2.6

Solution

Upgrade to versions 2.0.28, 2.1.11, 2.2.6 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-502: Deserialization of Untrusted Data

Source file

maven/org.apache.mina/mina-core/CVE-2026-41635.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:19:56 +0000.