-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability arises from two key points: (1) ObjectRepresentation's use of XMLDecoder for deserialization (explicitly warned about in its Javadoc post-patch), and (2) DefaultConverter's pre-patch default enabling of the APPLICATION_JAVA_OBJECT_XML media type. The combination of these factors allowed untrusted XML input to trigger code execution. The patch introduced a system property to disable XML deserialization by default, confirming these as the vulnerable points.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.restlet.jse:org.restlet | maven | < 2.1.4 | 2.1.4 |
Ongoing coverage of React2Shell