CVE-2025-61622: CWE-502 Deserialization of Untrusted Data in Apache Software Foundation Apache Fory
Deserialization of untrusted data in python in pyfory versions 0.12.0 through 0.12.2, or the legacy pyfury versions from 0.1.0 through 0.10.3: allows arbitrary code execution. An application is vulnerable if it reads pyfory serialized data from untrusted sources. An attacker can craft a data stream that selects pickle-fallback serializer during deserialization, leading to the execution of `pickle.loads`, which is vulnerable to remote code execution. Users are recommended to upgrade to pyfory version 0.12.3 or later, which has removed pickle fallback serializer and thus fixes this issue.
AI Analysis
Technical Summary
CVE-2025-61622 is a critical security vulnerability affecting Apache Software Foundation's Apache Fory project, specifically versions 0.12.0 through 0.12.2 and legacy pyfury versions 0.1.0 through 0.10.3. The vulnerability arises from unsafe deserialization of untrusted data in Python. Apache Fory uses a serialization mechanism called pyfory, which in vulnerable versions includes a fallback to Python's pickle serializer during deserialization. Pickle is known to be unsafe when processing untrusted input because it allows arbitrary code execution. An attacker who can supply crafted serialized data to an application using these vulnerable versions can trigger the fallback to pickle.loads, resulting in remote code execution (RCE) without requiring authentication or user interaction. This can lead to full system compromise, including confidentiality breaches, integrity violations, and denial of service. The vulnerability has a CVSS v3.1 base score of 9.8, indicating critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The issue was addressed in pyfory version 0.12.3 by removing the pickle fallback serializer, effectively mitigating the risk. No known exploits have been reported in the wild as of the publication date (October 1, 2025). This vulnerability is categorized under CWE-502 (Deserialization of Untrusted Data), a common and dangerous class of software flaws that often lead to remote code execution in applications that deserialize data from untrusted sources.
Potential Impact
For European organizations, the impact of CVE-2025-61622 can be severe. Organizations using Apache Fory in their software stacks—particularly those processing serialized data from external or untrusted sources—are at risk of remote code execution attacks. This can lead to unauthorized access, data theft, service disruption, and potential lateral movement within corporate networks. Critical infrastructure, financial institutions, healthcare providers, and government agencies in Europe that rely on Apache Fory or legacy pyfury components could face significant operational and reputational damage if exploited. The vulnerability’s ease of exploitation (no authentication or user interaction required) increases the risk of automated attacks and wormable scenarios. Additionally, the ability to execute arbitrary code remotely can facilitate deployment of ransomware, espionage tools, or other malware, further exacerbating the threat landscape for European entities. Given the critical nature of the vulnerability and the widespread use of Python-based serialization in modern applications, the potential impact spans confidentiality, integrity, and availability of affected systems.
Mitigation Recommendations
European organizations should immediately audit their software environments to identify any use of Apache Fory versions 0.12.0 through 0.12.2 or legacy pyfury versions 0.1.0 through 0.10.3. The primary mitigation is to upgrade to pyfory version 0.12.3 or later, which removes the insecure pickle fallback serializer. If upgrading is not immediately feasible, organizations should implement strict input validation and filtering to ensure that serialized data originates only from trusted sources. Network segmentation and application-layer firewalls can help restrict access to services that deserialize pyfory data. Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts. Additionally, organizations should review and harden their logging and monitoring to detect suspicious deserialization activities. Developers should avoid using pickle or any unsafe serializers for untrusted data and consider adopting safer serialization formats such as JSON or protobuf with strict schema validation. Finally, organizations should prepare incident response plans specific to deserialization vulnerabilities to rapidly contain and remediate any exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Switzerland
CVE-2025-61622: CWE-502 Deserialization of Untrusted Data in Apache Software Foundation Apache Fory
Description
Deserialization of untrusted data in python in pyfory versions 0.12.0 through 0.12.2, or the legacy pyfury versions from 0.1.0 through 0.10.3: allows arbitrary code execution. An application is vulnerable if it reads pyfory serialized data from untrusted sources. An attacker can craft a data stream that selects pickle-fallback serializer during deserialization, leading to the execution of `pickle.loads`, which is vulnerable to remote code execution. Users are recommended to upgrade to pyfory version 0.12.3 or later, which has removed pickle fallback serializer and thus fixes this issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-61622 is a critical security vulnerability affecting Apache Software Foundation's Apache Fory project, specifically versions 0.12.0 through 0.12.2 and legacy pyfury versions 0.1.0 through 0.10.3. The vulnerability arises from unsafe deserialization of untrusted data in Python. Apache Fory uses a serialization mechanism called pyfory, which in vulnerable versions includes a fallback to Python's pickle serializer during deserialization. Pickle is known to be unsafe when processing untrusted input because it allows arbitrary code execution. An attacker who can supply crafted serialized data to an application using these vulnerable versions can trigger the fallback to pickle.loads, resulting in remote code execution (RCE) without requiring authentication or user interaction. This can lead to full system compromise, including confidentiality breaches, integrity violations, and denial of service. The vulnerability has a CVSS v3.1 base score of 9.8, indicating critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The issue was addressed in pyfory version 0.12.3 by removing the pickle fallback serializer, effectively mitigating the risk. No known exploits have been reported in the wild as of the publication date (October 1, 2025). This vulnerability is categorized under CWE-502 (Deserialization of Untrusted Data), a common and dangerous class of software flaws that often lead to remote code execution in applications that deserialize data from untrusted sources.
Potential Impact
For European organizations, the impact of CVE-2025-61622 can be severe. Organizations using Apache Fory in their software stacks—particularly those processing serialized data from external or untrusted sources—are at risk of remote code execution attacks. This can lead to unauthorized access, data theft, service disruption, and potential lateral movement within corporate networks. Critical infrastructure, financial institutions, healthcare providers, and government agencies in Europe that rely on Apache Fory or legacy pyfury components could face significant operational and reputational damage if exploited. The vulnerability’s ease of exploitation (no authentication or user interaction required) increases the risk of automated attacks and wormable scenarios. Additionally, the ability to execute arbitrary code remotely can facilitate deployment of ransomware, espionage tools, or other malware, further exacerbating the threat landscape for European entities. Given the critical nature of the vulnerability and the widespread use of Python-based serialization in modern applications, the potential impact spans confidentiality, integrity, and availability of affected systems.
Mitigation Recommendations
European organizations should immediately audit their software environments to identify any use of Apache Fory versions 0.12.0 through 0.12.2 or legacy pyfury versions 0.1.0 through 0.10.3. The primary mitigation is to upgrade to pyfory version 0.12.3 or later, which removes the insecure pickle fallback serializer. If upgrading is not immediately feasible, organizations should implement strict input validation and filtering to ensure that serialized data originates only from trusted sources. Network segmentation and application-layer firewalls can help restrict access to services that deserialize pyfory data. Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts. Additionally, organizations should review and harden their logging and monitoring to detect suspicious deserialization activities. Developers should avoid using pickle or any unsafe serializers for untrusted data and consider adopting safer serialization formats such as JSON or protobuf with strict schema validation. Finally, organizations should prepare incident response plans specific to deserialization vulnerabilities to rapidly contain and remediate any exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apache
- Date Reserved
- 2025-09-29T06:47:23.146Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ddc314107aa30f08655c41
Added to database: 10/2/2025, 12:11:00 AM
Last enriched: 10/2/2025, 12:12:05 AM
Last updated: 10/3/2025, 8:14:58 AM
Views: 15
Related Threats
CVE-2025-0868: CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in Arc53 DocsGPT
CriticalCVE-2025-0616: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Teknolojik Center Telecommunication Industry Trade Co. Ltd. B2B - Netsis Panel
HighCVE-2025-6388: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Theme-Spirit Spirit Framework
CriticalCVE-2025-61671
UnknownCVE-2025-59536: CWE-94: Improper Control of Generation of Code ('Code Injection') in anthropics claude-code
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.