Home » Database

AVID-2026-R1003

Description

Deserialization of Untrusted Data (CVE-2022-25845)

Details

The package com.alibaba:fastjson before 1.2.83 are vulnerable to Deserialization of Untrusted Data by bypassing the default autoType shutdown restrictions, which is possible under certain conditions. Exploiting this vulnerability allows attacking remote servers. Workaround: If upgrading is not possible, you can enable safeMode.

Reason for inclusion in AVID: CVE-2022-25845 describes a deserialization of untrusted data vulnerability in the com.alibaba:fastjson library (versions before 1.2.83), allowing remote code execution by bypassing autoType shutdown restrictions. This is a software supply-chain risk in a widely-used library that can be part of AI data ingestion, processing, or service stacks. Although not AI-specific, such libraries are commonly used in components that build, deploy, or serve AI systems, making this a relevant vulnerability in the AI software stack. The CVE has clear security impact (RCE, remote exploitation) and is well-documented with multiple references. Therefore it qualifies as an AI-related supply-chain vulnerability with sufficient evidence.

References

Affected or Relevant Artifacts

  • Developer: n/a
  • Deployer: n/a
  • Artifact Details:
TypeName
Systemcom.alibaba:fastjson

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P
Base Score8.1
Base Severity🔴 High
Attack VectorNETWORK
Attack Complexity🔴 High
Privileges RequiredNONE
User InteractionNONE
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2022-06-10
  • Version: 0.3.3
  • AVID Entry