CVE-2026-42779
Remote Code Execution in Apache MINA
Publication date: 2026-05-01
Last updated on: 2026-05-01
Assigner: Apache Software Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apache | mina | From 2.1.0 (inc) to 2.1.12 (exc) |
| apache | mina | From 2.2.0 (inc) to 2.2.7 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Apache MINA's AbstractIoBuffer.resolveClass() method, where one branch of the code (handling static classes or primitive types) does not check the class against an allowlist. This allows arbitrary code execution by bypassing the classname allowlist.
The issue was that the fix for a previous vulnerability (CVE-2026-41635) was not applied to the 2.1.X and 2.2.X branches of Apache MINA, specifically versions 2.1.0 through 2.1.11 and 2.2.0 through 2.2.6.
The problem is triggered when applications using Apache MINA call the IoBuffer.getObject() method, which can lead to execution of arbitrary code if the class is not properly filtered.
The fix involves applying the classname allowlist earlier in the process to ensure only accepted classes are loaded.
How can this vulnerability impact me? :
This vulnerability can have severe impacts as it allows an attacker to execute arbitrary code remotely without any privileges or user interaction.
Because the CVSS v3.1 base score is 9.8, it indicates a critical severity with high impact on confidentiality, integrity, and availability.
- Remote attackers can execute arbitrary code on affected systems.
- This can lead to full system compromise, data theft, or disruption of services.
- Applications using vulnerable versions of Apache MINA that call IoBuffer.getObject() are at risk.
Upgrading to Apache MINA versions 2.1.12 or 2.2.7 or later is advised to mitigate this risk.
What immediate steps should I take to mitigate this vulnerability?
Applications using Apache MINA that call IoBuffer.getObject() are affected by this vulnerability.
The immediate mitigation step is to upgrade Apache MINA to version 2.1.12 or 2.2.7 or later, where the classname allowlist is applied earlier to prevent arbitrary code execution.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows arbitrary code execution due to a bypass of the classname allowlist in Apache MINA's AbstractIoBuffer.resolveClass().
Such a vulnerability can lead to unauthorized access, data breaches, or manipulation of sensitive data, which may impact compliance with standards like GDPR and HIPAA that require protection of personal and health information.
However, the provided information does not explicitly describe the direct impact on compliance with these regulations.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability affects Apache MINA versions 2.1.0 through 2.1.11 and 2.2.0 through 2.2.6, specifically when applications use the IoBuffer.getObject() method. Detection involves identifying if these vulnerable versions of Apache MINA are in use.
To detect the vulnerability on your system, you can check the version of Apache MINA installed or used by your applications.
- Use commands to find the Apache MINA version, for example, if using a package manager or inspecting application dependencies.
- If Apache MINA is packaged as a JAR, you can inspect the JAR manifest or metadata to determine the version.
- Search your codebase or runtime environment for usage of IoBuffer.getObject() calls, which are affected by this vulnerability.
Specific commands depend on your environment, but examples include:
- On Linux, to find Apache MINA JAR files and check their versions: `find /path/to/application -name "mina-*.jar" -exec unzip -p {} META-INF/MANIFEST.MF \; | grep 'Implementation-Version'`
- If using Maven, check the dependency tree: `mvn dependency:tree | grep mina`
- If using Gradle, check dependencies: `gradle dependencies | grep mina`
If vulnerable versions are found, it is recommended to upgrade to Apache MINA 2.1.12 or 2.2.7 or later.