CVE-2026-35337
Severity CVSS v4.0:
Pending analysis
Type:
CWE-502
Deserialization of Untrusted Dat
Publication date:
13/04/2026
Last modified:
13/04/2026
Description
Deserialization of Untrusted Data vulnerability in Apache Storm.<br />
<br />
Versions Affected:<br />
before 2.8.6.<br />
<br />
<br />
Description:<br />
When processing topology credentials submitted via the Nimbus Thrift API, Storm deserializes the base64-encoded TGT blob using ObjectInputStream.readObject() without any class filtering or validation. An authenticated user with topology submission rights could supply a crafted serialized object in the "TGT" credential field, leading to remote code execution in both the Nimbus and Worker JVMs.<br />
<br />
<br />
Mitigation:<br />
2.x users should upgrade to 2.8.6.<br />
<br />
<br />
Users who cannot upgrade immediately should monkey-patch an ObjectInputFilter allow-list to ClientAuthUtils.deserializeKerberosTicket() restricting deserialized classes to javax.security.auth.kerberos.KerberosTicket and its known dependencies. A guide on how to do this is available in the release notes of 2.8.6.<br />
<br />
Credit: This issue was discovered by K.



