CVE-2025-15222: Deserialization in Dromara Sa-Token
A vulnerability has been found in Dromara Sa-Token up to 1.44.0. This issue affects the function ObjectInputStream.readObject of the file SaSerializerTemplateForJdkUseBase64.java. Such manipulation leads to deserialization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-15222 identifies a deserialization vulnerability in the Dromara Sa-Token library, specifically in the ObjectInputStream.readObject method within the SaSerializerTemplateForJdkUseBase64.java file. This vulnerability arises from unsafe deserialization of Base64-encoded Java objects, which can be manipulated by an attacker to execute arbitrary code or cause denial of service if crafted maliciously. The vulnerability affects all versions of Sa-Token up to and including 1.44.0. Exploitation is remote and does not require user interaction, but it has high complexity, making it difficult to exploit successfully. The attacker needs low privileges, indicating that some level of access to the system or application is necessary. The vendor was notified early but did not provide a patch or response, and no official patch links are available. The CVSS 4.0 vector indicates network attack vector, high attack complexity, no privileges required, no user interaction, and low impact on confidentiality, integrity, and availability. Despite the low CVSS score, the vulnerability is significant because deserialization flaws can lead to severe consequences if exploited. The public disclosure increases the risk of future exploitation, although no known exploits are currently active in the wild.
Potential Impact
For European organizations, the impact of this vulnerability depends on the extent of Sa-Token usage within their Java-based authentication or session management systems. Successful exploitation could allow attackers to manipulate session tokens or authentication states, potentially leading to unauthorized access or privilege escalation. However, the high complexity and low CVSS score suggest limited immediate risk. Still, organizations in sectors with high security requirements—such as finance, healthcare, and critical infrastructure—could face reputational damage, data breaches, or service disruptions if exploited. The lack of vendor response and patch availability increases the risk exposure period. Additionally, organizations relying on third-party software that integrates Sa-Token may be indirectly affected. Given the remote attack vector, internet-facing applications using Sa-Token are at higher risk. The vulnerability's low impact rating reflects limited confidentiality, integrity, and availability loss, but the potential for chained attacks or exploitation in complex environments should not be underestimated.
Mitigation Recommendations
European organizations should immediately audit their environments for Sa-Token usage, especially versions up to 1.44.0. If Sa-Token is in use, consider the following mitigations: 1) Implement strict input validation and sanitization on any serialized data inputs to prevent malicious payloads. 2) Restrict network exposure of services using Sa-Token to trusted internal networks or VPNs to reduce remote attack surface. 3) Employ runtime application self-protection (RASP) or Web Application Firewalls (WAF) with custom rules to detect and block suspicious deserialization patterns. 4) Monitor logs for unusual deserialization activity or errors related to ObjectInputStream.readObject. 5) Where possible, replace Java native serialization with safer alternatives such as JSON or protocol buffers. 6) Engage with the Dromara community or maintainers to track any forthcoming patches or updates. 7) Conduct penetration testing focused on deserialization attacks to identify exploitable vectors. 8) Apply the principle of least privilege to limit the impact of potential exploitation. These steps go beyond generic advice by focusing on network segmentation, monitoring, and alternative serialization methods.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2025-15222: Deserialization in Dromara Sa-Token
Description
A vulnerability has been found in Dromara Sa-Token up to 1.44.0. This issue affects the function ObjectInputStream.readObject of the file SaSerializerTemplateForJdkUseBase64.java. Such manipulation leads to deserialization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-15222 identifies a deserialization vulnerability in the Dromara Sa-Token library, specifically in the ObjectInputStream.readObject method within the SaSerializerTemplateForJdkUseBase64.java file. This vulnerability arises from unsafe deserialization of Base64-encoded Java objects, which can be manipulated by an attacker to execute arbitrary code or cause denial of service if crafted maliciously. The vulnerability affects all versions of Sa-Token up to and including 1.44.0. Exploitation is remote and does not require user interaction, but it has high complexity, making it difficult to exploit successfully. The attacker needs low privileges, indicating that some level of access to the system or application is necessary. The vendor was notified early but did not provide a patch or response, and no official patch links are available. The CVSS 4.0 vector indicates network attack vector, high attack complexity, no privileges required, no user interaction, and low impact on confidentiality, integrity, and availability. Despite the low CVSS score, the vulnerability is significant because deserialization flaws can lead to severe consequences if exploited. The public disclosure increases the risk of future exploitation, although no known exploits are currently active in the wild.
Potential Impact
For European organizations, the impact of this vulnerability depends on the extent of Sa-Token usage within their Java-based authentication or session management systems. Successful exploitation could allow attackers to manipulate session tokens or authentication states, potentially leading to unauthorized access or privilege escalation. However, the high complexity and low CVSS score suggest limited immediate risk. Still, organizations in sectors with high security requirements—such as finance, healthcare, and critical infrastructure—could face reputational damage, data breaches, or service disruptions if exploited. The lack of vendor response and patch availability increases the risk exposure period. Additionally, organizations relying on third-party software that integrates Sa-Token may be indirectly affected. Given the remote attack vector, internet-facing applications using Sa-Token are at higher risk. The vulnerability's low impact rating reflects limited confidentiality, integrity, and availability loss, but the potential for chained attacks or exploitation in complex environments should not be underestimated.
Mitigation Recommendations
European organizations should immediately audit their environments for Sa-Token usage, especially versions up to 1.44.0. If Sa-Token is in use, consider the following mitigations: 1) Implement strict input validation and sanitization on any serialized data inputs to prevent malicious payloads. 2) Restrict network exposure of services using Sa-Token to trusted internal networks or VPNs to reduce remote attack surface. 3) Employ runtime application self-protection (RASP) or Web Application Firewalls (WAF) with custom rules to detect and block suspicious deserialization patterns. 4) Monitor logs for unusual deserialization activity or errors related to ObjectInputStream.readObject. 5) Where possible, replace Java native serialization with safer alternatives such as JSON or protocol buffers. 6) Engage with the Dromara community or maintainers to track any forthcoming patches or updates. 7) Conduct penetration testing focused on deserialization attacks to identify exploitable vectors. 8) Apply the principle of least privilege to limit the impact of potential exploitation. These steps go beyond generic advice by focusing on network segmentation, monitoring, and alternative serialization methods.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-28T16:00:29.649Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695450abdb813ff03e2beb5f
Added to database: 12/30/2025, 10:22:35 PM
Last enriched: 12/30/2025, 10:49:53 PM
Last updated: 2/7/2026, 12:42:25 AM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.