CVE-2026-35337

Severity CVSS v4.0:
Pending analysis
Type:
CWE-502 Deserialization of Untrusted Dat
Publication date:
13/04/2026
Last modified:
13/04/2026

Description

Deserialization of Untrusted Data vulnerability in Apache Storm.<br /> <br /> Versions Affected:<br /> before 2.8.6.<br /> <br /> <br /> Description:<br /> When processing topology credentials submitted via the Nimbus Thrift API, Storm deserializes the base64-encoded TGT blob using ObjectInputStream.readObject() without any class filtering or validation. An authenticated user with topology submission rights could supply a crafted serialized object in the "TGT" credential field, leading to remote code execution in both the Nimbus and Worker JVMs.<br /> <br /> <br /> Mitigation:<br /> 2.x users should upgrade to 2.8.6.<br /> <br /> <br /> Users who cannot upgrade immediately should monkey-patch an ObjectInputFilter allow-list to ClientAuthUtils.deserializeKerberosTicket() restricting deserialized classes to javax.security.auth.kerberos.KerberosTicket and its known dependencies. A guide on how to do this is available in the release notes of 2.8.6.<br /> <br /> Credit: This issue was discovered by K.

Impact