CVE-2025-64408: Apache Causeway vulnerable to deserialization in Java
Apache Causeway faces Java deserialization vulnerabilities that allow remote code execution (RCE) through user-controllable URL parameters. These vulnerabilities affect all applications using Causeway’s ViewModel functionality and can be exploited by authenticated attackers to execute arbitrary code with application privileges.
This issue affects all current versions.
Users are recommended to upgrade to version 3.5.0, which fixes the issue.
References
- github.com/advisories/GHSA-wq4c-57mh-5f7g
- github.com/apache/causeway
- github.com/apache/causeway/commit/bef00f58d2a2cba9a45230c9d117a0327e4c7038
- github.com/apache/causeway/commit/e66290fe9be87aa0e4c5dc55bce1993a54330624
- github.com/apache/causeway/commit/e6bf00c63c33cfa894a19d6122526a1aec227d14
- issues.apache.org/jira/browse/CAUSEWAY-3939
- lists.apache.org/thread/rjlg4spqhmgy1xgq9wq5h2tfnq4pm70b
- nvd.nist.gov/vuln/detail/CVE-2025-64408
Code Behaviors & Features
Detect and mitigate CVE-2025-64408 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →