Deserialization of Untrusted Data vulnerability in Apache Seata (incubating).





This issue affects Apache Seata (incubating): from 2.0.0 before 2.2.0.





Severity Justification:

The Apache Seata security team assesses the severity of this vulnerability as "Low" due to stringent real-world mitigating factors. First, the vulnerability is strictly isolated to the Raft cluster mode, an optional and non-default feature introduced in v2.0.0, while most users rely on the unaffected traditional architecture. Second, Seata is an internal middleware; communication between TC and RM/TM occurs entirely within trusted internal networks. An attacker would require prior, unauthorized access to the Intranet to exploit this, making external exploitation highly improbable.





Users are recommended to upgrade to version 2.2.0, which fixes the issue.

Project Subscriptions

Vendors Products
Advisories
Source ID Title
EUVD EUVD EUVD-2025-6743 Deserialization of Untrusted Data vulnerability in Apache Seata (incubating). This issue affects Apache Seata (incubating): from 2.0.0 before 2.2.0. Users are recommended to upgrade to version 2.2.0, which fixes the issue.
Github GHSA Github GHSA GHSA-2r4x-667f-mpfh Apache Seata Vulnerable to Deserialization of Untrusted Data
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 30 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in Apache Seata (incubating). This issue affects Apache Seata (incubating): from 2.0.0 before 2.2.0. Users are recommended to upgrade to version 2.2.0, which fixes the issue. Deserialization of Untrusted Data vulnerability in Apache Seata (incubating). This issue affects Apache Seata (incubating): from 2.0.0 before 2.2.0. Severity Justification: The Apache Seata security team assesses the severity of this vulnerability as "Low" due to stringent real-world mitigating factors. First, the vulnerability is strictly isolated to the Raft cluster mode, an optional and non-default feature introduced in v2.0.0, while most users rely on the unaffected traditional architecture. Second, Seata is an internal middleware; communication between TC and RM/TM occurs entirely within trusted internal networks. An attacker would require prior, unauthorized access to the Intranet to exploit this, making external exploitation highly improbable. Users are recommended to upgrade to version 2.2.0, which fixes the issue.

Tue, 24 Mar 2026 10:30:00 +0000


Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00199}

epss

{'score': 0.00078}


Tue, 01 Apr 2025 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache seata
CPEs cpe:2.3:a:apache:seata:*:*:*:*:*:*:*:*
Vendors & Products Apache
Apache seata

Mon, 24 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 20 Mar 2025 09:45:00 +0000

Type Values Removed Values Added
References

Thu, 20 Mar 2025 09:00:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in Apache Seata (incubating). This issue affects Apache Seata (incubating): from 2.0.0 before 2.2.0. Users are recommended to upgrade to version 2.2.0, which fixes the issue.
Title Apache Seata (incubating): Deserialization of untrusted Data in jraft mode in Apache Seata Server
Weaknesses CWE-502
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-03-30T08:35:40.674Z

Reserved: 2024-09-26T12:19:33.596Z

Link: CVE-2024-47552

cve-icon Vulnrichment

Updated: 2025-03-20T09:03:43.843Z

cve-icon NVD

Status : Modified

Published: 2025-03-20T09:15:12.803

Modified: 2026-03-30T09:16:14.620

Link: CVE-2024-47552

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses