Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66631: CWE-502: Deserialization of Untrusted Data in MarimerLLC csla

0
High
VulnerabilityCVE-2025-66631cvecve-2025-66631cwe-502
Published: Tue Dec 09 2025 (12/09/2025, 03:18:37 UTC)
Source: CVE Database V5
Vendor/Project: MarimerLLC
Product: csla

Description

CSLA .NET is a framework designed for the development of reusable, object-oriented business layers for applications. Versions 5.5.4 and below allow the use of WcfProxy. WcfProxy uses the now-obsolete NetDataContractSerializer (NDCS) and is vulnerable to remote code execution during deserialization. This vulnerability is fixed in version 6.0.0. To workaround this issue, remove the WcfProxy in data portal configurations.

AI-Powered Analysis

AILast updated: 12/09/2025, 04:00:55 UTC

Technical Analysis

CVE-2025-66631 is a deserialization vulnerability classified under CWE-502 affecting the CSLA .NET framework, a widely used framework for building reusable, object-oriented business layers in applications. The vulnerability exists in versions 5.5.4 and earlier, specifically within the WcfProxy component that utilizes the deprecated NetDataContractSerializer (NDCS). NDCS is known to be unsafe because it deserializes data without sufficient validation, allowing attackers to craft malicious serialized payloads that, when deserialized, can execute arbitrary code remotely. This vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 base score is 7.2, indicating high severity, with network attack vector, low attack complexity, and no privileges required. The vulnerability impacts confidentiality, integrity, and availability by enabling remote code execution, potentially leading to full system compromise. The issue is resolved in CSLA .NET version 6.0.0, which removes or replaces the vulnerable serialization mechanism. As an immediate workaround, organizations can disable or remove the WcfProxy component from their data portal configurations to prevent exposure. No public exploits have been reported yet, but the vulnerability's nature and ease of exploitation make it a critical concern for developers and system administrators using affected versions.

Potential Impact

For European organizations, the impact of CVE-2025-66631 can be severe, especially those relying on CSLA .NET for critical business applications. Successful exploitation allows attackers to execute arbitrary code remotely, potentially leading to data breaches, system downtime, and unauthorized access to sensitive business logic and data. This can disrupt operations, cause financial losses, and damage reputations. Given the framework’s use in enterprise environments, attackers could pivot within networks to escalate privileges or move laterally. The vulnerability affects confidentiality, integrity, and availability, making it a comprehensive threat. Organizations in sectors such as finance, manufacturing, and government, which often use .NET frameworks for internal applications, are particularly vulnerable. The lack of required authentication and user interaction increases the risk of automated or widespread attacks. Although no known exploits are currently in the wild, the vulnerability’s characteristics suggest that exploitation could become common once public proof-of-concept code appears.

Mitigation Recommendations

1. Upgrade CSLA .NET to version 6.0.0 or later immediately, as this version contains the official fix for the vulnerability. 2. If immediate upgrade is not feasible, remove or disable the WcfProxy component in the data portal configurations to prevent the vulnerable serialization mechanism from being used. 3. Review and restrict network access to services using CSLA .NET, especially those exposing WcfProxy endpoints, limiting exposure to trusted internal networks only. 4. Implement application-layer firewalls or intrusion detection systems to monitor and block suspicious serialized payloads targeting the vulnerable component. 5. Conduct thorough code audits to identify any custom deserialization logic that might be vulnerable and refactor to use safe serialization alternatives. 6. Educate developers and system administrators about the risks of unsafe deserialization and encourage adoption of secure coding practices. 7. Monitor vendor advisories and threat intelligence feeds for any emerging exploits or patches related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-05T15:42:44.716Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69379c1c0af42da4c573d32a

Added to database: 12/9/2025, 3:48:44 AM

Last enriched: 12/9/2025, 4:00:55 AM

Last updated: 12/11/2025, 5:41:02 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats