CVE-2025-66631
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-09

Last updated on: 2026-03-25

Assigner: GitHub, Inc.

Description
CSLA .NET is a framework designed for the development of reusable, object-oriented business layers for applications. Versions 5.5.4 and below allow the use of WcfProxy. WcfProxy uses the now-obsolete NetDataContractSerializer (NDCS) and is vulnerable to remote code execution during deserialization. This vulnerability is fixed in version 6.0.0. To workaround this issue, remove the WcfProxy in data portal configurations.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-09
Last Modified
2026-03-25
Generated
2026-05-07
AI Q&A
2025-12-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
cslanet csla_.net to 6.0.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in CSLA .NET versions 5.5.4 and below, specifically in the WcfProxy component which uses the obsolete NetDataContractSerializer (NDCS). The issue allows remote code execution during the deserialization process, meaning an attacker could execute arbitrary code remotely by exploiting how data is deserialized. The vulnerability is fixed in version 6.0.0, and a workaround is to remove WcfProxy from data portal configurations.


How can this vulnerability impact me? :

This vulnerability can lead to remote code execution on systems using vulnerable versions of CSLA .NET with WcfProxy enabled. An attacker could exploit this to run arbitrary code remotely, potentially compromising the affected system, leading to data breaches, system control loss, or further attacks within the network.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, remove the WcfProxy in data portal configurations or upgrade CSLA .NET to version 6.0.0 or later where the issue is fixed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart