Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54539: CWE-502 Deserialization of Untrusted Data in Apache Software Foundation Apache ActiveMQ NMS AMQP Client

0
Critical
VulnerabilityCVE-2025-54539cvecve-2025-54539cwe-502
Published: Thu Oct 16 2025 (10/16/2025, 08:26:06 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache ActiveMQ NMS AMQP Client

Description

A Deserialization of Untrusted Data vulnerability exists in the Apache ActiveMQ NMS AMQP Client. This issue affects all versions of Apache ActiveMQ NMS AMQP up to and including 2.3.0, when establishing connections to untrusted AMQP servers. Malicious servers could exploit unbounded deserialization logic present in the client to craft responses that may lead to arbitrary code execution on the client side. Although version 2.1.0 introduced a mechanism to restrict deserialization via allow/deny lists, the protection was found to be bypassable under certain conditions. In line with Microsoft’s deprecation of binary serialization in .NET 9, the project is evaluating the removal of .NET binary serialization support from the NMS API entirely in future releases. Mitigation and Recommendations: Users are strongly encouraged to upgrade to version 2.4.0 or later, which resolves the issue. Additionally, projects depending on NMS-AMQP should migrate away from .NET binary serialization as part of a long-term hardening strategy.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:34:22 UTC

Technical Analysis

CVE-2025-54539 is a deserialization of untrusted data vulnerability (CWE-502) found in the Apache ActiveMQ NMS AMQP Client, affecting all versions up to and including 2.3.0. The flaw arises when the client establishes connections to untrusted AMQP servers, which can send maliciously crafted serialized data. The client’s deserialization logic does not sufficiently validate or restrict incoming serialized objects, allowing attackers to execute arbitrary code on the client machine. Although version 2.1.0 implemented allow/deny lists to limit deserialization to safe types, these controls have been demonstrated to be bypassable under certain conditions, leaving the client exposed. The vulnerability leverages .NET binary serialization, a mechanism Microsoft plans to deprecate in .NET 9, prompting the Apache project to consider removing this feature entirely in future releases. The vulnerability is remotely exploitable without authentication or user interaction, making it highly dangerous. The Apache ActiveMQ NMS AMQP Client is a .NET client library used to connect to ActiveMQ brokers via the AMQP protocol, commonly deployed in enterprise messaging infrastructures. The critical CVSS score of 9.8 reflects the vulnerability’s potential to compromise confidentiality, integrity, and availability by enabling remote code execution. Users are urged to upgrade to version 2.4.0 or later, which contains fixes that prevent this attack vector. Additionally, projects should plan to phase out .NET binary serialization to reduce attack surface and align with modern security best practices.

Potential Impact

The vulnerability allows remote attackers controlling an AMQP server to execute arbitrary code on client machines running vulnerable versions of Apache ActiveMQ NMS AMQP Client. This can lead to full system compromise, data theft, unauthorized access, and disruption of messaging services. Since the client is often integrated into enterprise messaging systems, exploitation could affect critical business processes, potentially impacting financial transactions, communications, and operational workflows. The lack of authentication or user interaction requirements increases the risk of widespread exploitation, especially in environments where clients connect to untrusted or external AMQP servers. Organizations relying on this client in cloud, hybrid, or multi-tenant environments may face elevated risks. The vulnerability also threatens the integrity and availability of messaging infrastructure, potentially causing denial of service or persistent backdoors. Given the critical CVSS rating and the nature of the flaw, the impact is severe for organizations using affected versions, particularly those with high-value or sensitive data flows.

Mitigation Recommendations

Immediate mitigation requires upgrading all deployments of Apache ActiveMQ NMS AMQP Client to version 2.4.0 or later, which contains patches that properly restrict deserialization and eliminate the vulnerability. Organizations should audit their messaging infrastructure to identify all instances of the vulnerable client and prioritize patching. As a long-term strategy, projects should migrate away from .NET binary serialization, replacing it with safer serialization formats such as JSON or Protocol Buffers, which are less prone to deserialization attacks. Network segmentation and strict firewall rules should be applied to limit client connections to trusted AMQP servers only. Implementing runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions can help detect and block suspicious deserialization activities. Developers should review and harden deserialization logic, employing allowlists that are rigorously tested against bypass attempts. Monitoring logs for unusual AMQP server responses or client crashes can provide early warning of exploitation attempts. Finally, organizations should stay informed about updates from Apache and .NET regarding serialization security to adapt defenses accordingly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-07-24T12:27:56.030Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f0accc9f8a5dbaeaba941c

Added to database: 10/16/2025, 8:29:00 AM

Last enriched: 2/27/2026, 5:34:22 AM

Last updated: 3/26/2026, 8:06:28 AM

Views: 926

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses