CVE-2025-29953 – Apache ActiveMQ NMS OpenWire Client Arbitrary Code Execution via Untrusted Deserialization

The following table lists the changes that have been made to the
CVE-2025-29953 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Apr. 18, 2025

    Action Type Old Value New Value
    Added Description Deserialization of Untrusted Data vulnerability in Apache ActiveMQ NMS OpenWire Client.

    This issue affects Apache ActiveMQ NMS OpenWire Client before 2.1.1 when performing connections to untrusted servers. Such servers could abuse the unbounded deserialization in the client to provide malicious responses that may eventually cause arbitrary code execution on the client. Version 2.1.0 introduced a allow/denylist feature to restrict deserialization, but this feature could be bypassed.

    The .NET team has deprecated the built-in .NET binary serialization feature starting with .NET 9 and suggests migrating away from binary serialization. The project is considering to follow suit and drop this part of the NMS API altogether.

    Users are recommended to upgrade to version 2.1.1, which fixes the issue. We also recommend to migrate away from relying on .NET binary serialization as a hardening method for the future.

    Added CWE CWE-502
    Added Reference https://lists.apache.org/thread/vc1sj9y3056d3kkhcvrs9fyw5w8kpmlx
Share the Post:

Related Posts