-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.shardingsphere:shardingsphere | maven | <= 5.3.2 | 5.4.0 |
The vulnerability stems from unsafe YAML deserialization using SnakeYAML. The advisory explicitly mentions exploitation via deserializing java.net.URLClassLoader and javax.script.ScriptEngineManager, which implies the configuration loader uses generic deserialization (Yaml.load()) rather than type-restricted parsing. The AgentConfigurationLoader class is the logical component handling YAML configuration parsing in ShardingSphere-Agent, and versions ≤5.3.2 would lack the safe deserialization fixes implemented in 5.4.0. The confidence is high because the attack vector directly maps to YAML deserialization entry points in the agent's configuration loading mechanism.
Ongoing coverage of React2Shell