CVE-2026-42779

Severity CVSS v4.0:
Pending analysis
Type:
CWE-502 Deserialization of Untrusted Dat
Publication date:
01/05/2026
Last modified:
01/05/2026

Description

The fix for CVE-2026-41635 was not applied to the 2.1.X and 2.2.X branches. Here was the original issue description:<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> Apache MINA&amp;#39;s AbstractIoBuffer.resolveClass() contains two branches, one of them (for static classes or primitive types) does not check the class at all, bypassing the classname allowlist and allowing arbitrary code to be executed.<br /> <br /> <br /> <br /> <br /> The fix checks if the class is present in the accepted class filter before calling Class.forName(). <br /> <br /> <br /> <br /> <br /> <br /> <br /> Affected versions are Apache MINA 2.1.0

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:apache:mina:*:*:*:*:*:*:*:* 2.1.0 (including) 2.1.12 (excluding)
cpe:2.3:a:apache:mina:*:*:*:*:*:*:*:* 2.2.0 (including) 2.2.7 (excluding)


References to Advisories, Solutions, and Tools