CVE-2025-70974: CWE-829 Inclusion of Functionality from Untrusted Control Sphere in Alibaba Fastjson
CVE-2025-70974 is a critical remote code execution vulnerability in Alibaba's Fastjson library versions before 1. 2. 48. It arises from improper handling of the @type key in JSON documents, allowing attackers to trigger calls to arbitrary Java class methods, potentially leading to JNDI injection attacks. This vulnerability is a result of an incomplete fix for a previous issue (CVE-2017-18349) and is related to another bypass vulnerability (CVE-2022-25845). The flaw requires no authentication or user interaction and can be exploited remotely over the network, impacting confidentiality, integrity, and availability. European organizations using vulnerable Fastjson versions in their Java applications are at high risk of compromise. Immediate patching or upgrading to fixed versions is essential to mitigate this threat. Countries with significant Java development and usage in sectors like finance, government, and critical infrastructure are most likely to be targeted.
AI Analysis
Technical Summary
CVE-2025-70974 is a critical vulnerability in Alibaba's Fastjson library, a widely used Java JSON parser and serializer. The flaw stems from improper handling of the @type key in JSON input, which Fastjson uses to determine the Java class to instantiate during deserialization. Versions prior to 1.2.48 fail to properly restrict or validate the classes specified, allowing attackers to specify arbitrary Java classes. When these classes have public methods that can be invoked during deserialization, attackers can exploit this to perform JNDI injection by embedding malicious payloads elsewhere in the JSON document. JNDI injection can lead to remote code execution by causing the application to fetch and execute attacker-controlled code from LDAP or other JNDI-supported services. This vulnerability is a direct consequence of an incomplete remediation of CVE-2017-18349 and is related to CVE-2022-25845, which demonstrated bypass techniques. The CVSS v3.1 score of 10.0 reflects the vulnerability's ease of exploitation (no authentication or user interaction required), its network attack vector, and its severe impact on confidentiality, integrity, and availability. Exploitation can lead to full system compromise, data theft, or service disruption. Although no known exploits in the wild are reported at the time of publication, the criticality and history of exploitation of similar Fastjson vulnerabilities warrant immediate attention. The vulnerability affects all applications using vulnerable Fastjson versions, especially those exposed to untrusted JSON input, such as web services and APIs.
Potential Impact
For European organizations, the impact of CVE-2025-70974 is severe. Exploitation can lead to remote code execution, allowing attackers to take full control of affected systems, steal sensitive data, disrupt services, or move laterally within networks. Industries with heavy reliance on Java applications and Fastjson, such as banking, telecommunications, healthcare, and government, face heightened risks. Compromise of critical infrastructure or sensitive personal data could result in regulatory penalties under GDPR and damage to reputation. The vulnerability's network accessibility and lack of authentication requirements increase the likelihood of automated exploitation attempts. Additionally, the widespread use of Fastjson in enterprise software and cloud services across Europe amplifies the potential attack surface. Organizations may also face challenges in detection and response due to the subtlety of deserialization attacks and the complexity of Java environments.
Mitigation Recommendations
European organizations should immediately identify all instances of Fastjson in their environments, including transitive dependencies in third-party software. They must upgrade to Fastjson version 1.2.48 or later, where the vulnerability is fixed. If upgrading is not immediately feasible, organizations should implement strict input validation and disable autoType features or restrict allowed classes via Fastjson's white-listing mechanisms. Network-level controls such as web application firewalls (WAFs) should be configured to detect and block suspicious JSON payloads containing @type keys referencing dangerous classes. Monitoring and logging deserialization activities can help detect exploitation attempts. Security teams should conduct thorough code reviews and penetration testing focused on deserialization vulnerabilities. Additionally, organizations should ensure their incident response plans include scenarios involving deserialization attacks and JNDI injection. Vendor coordination is critical to ensure third-party applications are also patched promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland
CVE-2025-70974: CWE-829 Inclusion of Functionality from Untrusted Control Sphere in Alibaba Fastjson
Description
CVE-2025-70974 is a critical remote code execution vulnerability in Alibaba's Fastjson library versions before 1. 2. 48. It arises from improper handling of the @type key in JSON documents, allowing attackers to trigger calls to arbitrary Java class methods, potentially leading to JNDI injection attacks. This vulnerability is a result of an incomplete fix for a previous issue (CVE-2017-18349) and is related to another bypass vulnerability (CVE-2022-25845). The flaw requires no authentication or user interaction and can be exploited remotely over the network, impacting confidentiality, integrity, and availability. European organizations using vulnerable Fastjson versions in their Java applications are at high risk of compromise. Immediate patching or upgrading to fixed versions is essential to mitigate this threat. Countries with significant Java development and usage in sectors like finance, government, and critical infrastructure are most likely to be targeted.
AI-Powered Analysis
Technical Analysis
CVE-2025-70974 is a critical vulnerability in Alibaba's Fastjson library, a widely used Java JSON parser and serializer. The flaw stems from improper handling of the @type key in JSON input, which Fastjson uses to determine the Java class to instantiate during deserialization. Versions prior to 1.2.48 fail to properly restrict or validate the classes specified, allowing attackers to specify arbitrary Java classes. When these classes have public methods that can be invoked during deserialization, attackers can exploit this to perform JNDI injection by embedding malicious payloads elsewhere in the JSON document. JNDI injection can lead to remote code execution by causing the application to fetch and execute attacker-controlled code from LDAP or other JNDI-supported services. This vulnerability is a direct consequence of an incomplete remediation of CVE-2017-18349 and is related to CVE-2022-25845, which demonstrated bypass techniques. The CVSS v3.1 score of 10.0 reflects the vulnerability's ease of exploitation (no authentication or user interaction required), its network attack vector, and its severe impact on confidentiality, integrity, and availability. Exploitation can lead to full system compromise, data theft, or service disruption. Although no known exploits in the wild are reported at the time of publication, the criticality and history of exploitation of similar Fastjson vulnerabilities warrant immediate attention. The vulnerability affects all applications using vulnerable Fastjson versions, especially those exposed to untrusted JSON input, such as web services and APIs.
Potential Impact
For European organizations, the impact of CVE-2025-70974 is severe. Exploitation can lead to remote code execution, allowing attackers to take full control of affected systems, steal sensitive data, disrupt services, or move laterally within networks. Industries with heavy reliance on Java applications and Fastjson, such as banking, telecommunications, healthcare, and government, face heightened risks. Compromise of critical infrastructure or sensitive personal data could result in regulatory penalties under GDPR and damage to reputation. The vulnerability's network accessibility and lack of authentication requirements increase the likelihood of automated exploitation attempts. Additionally, the widespread use of Fastjson in enterprise software and cloud services across Europe amplifies the potential attack surface. Organizations may also face challenges in detection and response due to the subtlety of deserialization attacks and the complexity of Java environments.
Mitigation Recommendations
European organizations should immediately identify all instances of Fastjson in their environments, including transitive dependencies in third-party software. They must upgrade to Fastjson version 1.2.48 or later, where the vulnerability is fixed. If upgrading is not immediately feasible, organizations should implement strict input validation and disable autoType features or restrict allowed classes via Fastjson's white-listing mechanisms. Network-level controls such as web application firewalls (WAFs) should be configured to detect and block suspicious JSON payloads containing @type keys referencing dangerous classes. Monitoring and logging deserialization activities can help detect exploitation attempts. Security teams should conduct thorough code reviews and penetration testing focused on deserialization vulnerabilities. Additionally, organizations should ensure their incident response plans include scenarios involving deserialization attacks and JNDI injection. Vendor coordination is critical to ensure third-party applications are also patched promptly.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-01-09T06:43:23.338Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6960a6a3ecefc3cd7c0ce3f6
Added to database: 1/9/2026, 6:56:35 AM
Last enriched: 1/16/2026, 9:56:25 AM
Last updated: 2/21/2026, 3:37:49 AM
Views: 169
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65995: CWE-209 Generation of Error Message Containing Sensitive Information in Apache Software Foundation Apache Airflow
HighCVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.