CVE-2026-35337
Severity CVSS v4.0:
Pending analysis
Type:
CWE-502
Deserialization of Untrusted Dat
Publication date:
13/04/2026
Last modified:
15/04/2026
Description
Deserialization of Untrusted Data vulnerability in Apache Storm.<br />
<br />
Versions Affected:<br />
before 2.8.6.<br />
<br />
<br />
Description:<br />
When processing topology credentials submitted via the Nimbus Thrift API, Storm deserializes the base64-encoded TGT blob using ObjectInputStream.readObject() without any class filtering or validation. An authenticated user with topology submission rights could supply a crafted serialized object in the "TGT" credential field, leading to remote code execution in both the Nimbus and Worker JVMs.<br />
<br />
<br />
Mitigation:<br />
2.x users should upgrade to 2.8.6.<br />
<br />
<br />
Users who cannot upgrade immediately should monkey-patch an ObjectInputFilter allow-list to ClientAuthUtils.deserializeKerberosTicket() restricting deserialized classes to javax.security.auth.kerberos.KerberosTicket and its known dependencies. A guide on how to do this is available in the release notes of 2.8.6.<br />
<br />
Credit: This issue was discovered by K.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apache:storm:*:*:*:*:*:*:*:* | 2.0.0 (including) | 2.8.6 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



