Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32897: CWE-502 Deserialization of Untrusted Data in Apache Software Foundation Apache Seata (incubating)

0
Critical
VulnerabilityCVE-2025-32897cvecve-2025-32897cwe-502
Published: Sat Jun 28 2025 (06/28/2025, 18:25:18 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Seata (incubating)

Description

Deserialization of Untrusted Data vulnerability in Apache Seata (incubating). This security vulnerability is the same as CVE-2024-47552, but the version range described in the CVE-2024-47552 definition is too narrow. This issue affects Apache Seata (incubating): from 2.0.0 before 2.3.0. Severity Justification: The Apache Seata security team assesses the severity of this vulnerability as "Low" due to stringent real-world mitigating factors. First, the vulnerability is strictly isolated to the Raft cluster mode, an optional and non-default feature introduced in v2.0.0, while most users rely on the unaffected traditional architecture. Second, Seata is an internal middleware; communication between TC and RM/TM occurs entirely within trusted internal networks. An attacker would require prior, unauthorized access to the Intranet to exploit this, making external exploitation highly improbable. Users are recommended to upgrade to version 2.3.0, which fixes the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 13:12:53 UTC

Technical Analysis

This vulnerability involves unsafe deserialization of untrusted data in Apache Seata (incubating) versions 2.0.0 up to but not including 2.3.0. It specifically impacts the Raft cluster mode, which is optional and not enabled by default. Because Seata operates as internal middleware with communication confined to trusted internal networks, exploitation requires prior unauthorized intranet access. The vulnerability is similar to CVE-2024-47552 but affects a broader version range. The Apache Seata team has assigned a low severity rating based on these real-world mitigating factors. An upgrade to version 2.3.0 is recommended to remediate the issue.

Potential Impact

The vulnerability allows for deserialization of untrusted data, which could lead to full compromise (confidentiality, integrity, availability) of affected components in the Raft cluster mode. However, since this mode is optional and not enabled by default, and because the communication occurs only within trusted internal networks, the risk of external exploitation is minimal. No known exploits are reported in the wild. The CVSS score is 9.8 (critical), but the vendor rates the practical severity as low due to the limited attack surface and required attacker capabilities.

Mitigation Recommendations

Users should upgrade Apache Seata to version 2.3.0 or later, where this vulnerability is fixed. Since the vulnerability only affects the optional Raft cluster mode, disabling this mode if not in use can also mitigate risk. No other specific mitigations are indicated. Patch status is confirmed by the vendor advisory recommending upgrade to 2.3.0.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-04-12T13:34:54.918Z
Cvss Version
null
State
PUBLISHED

Threat ID: 686036e06f40f0eb72718c64

Added to database: 6/28/2025, 6:39:28 PM

Last enriched: 4/3/2026, 1:12:53 PM

Last updated: 5/9/2026, 8:03:04 AM

Views: 438

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses