Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70974: CWE-829 Inclusion of Functionality from Untrusted Control Sphere in Alibaba Fastjson

0
Critical
VulnerabilityCVE-2025-70974cvecve-2025-70974cwe-829
Published: Fri Jan 09 2026 (01/09/2026, 06:43:23 UTC)
Source: CVE Database V5
Vendor/Project: Alibaba
Product: Fastjson

Description

CVE-2025-70974 is a critical remote code execution vulnerability in Alibaba's Fastjson library versions before 1. 2. 48. It arises from improper handling of the @type key in JSON documents, allowing attackers to trigger calls to arbitrary Java class methods, potentially leading to JNDI injection attacks. This vulnerability is a result of an incomplete fix for a previous issue (CVE-2017-18349) and is related to another bypass vulnerability (CVE-2022-25845). The flaw requires no authentication or user interaction and can be exploited remotely over the network, impacting confidentiality, integrity, and availability. European organizations using vulnerable Fastjson versions in their Java applications are at high risk of compromise. Immediate patching or upgrading to fixed versions is essential to mitigate this threat. Countries with significant Java development and usage in sectors like finance, government, and critical infrastructure are most likely to be targeted.

AI-Powered Analysis

AILast updated: 01/16/2026, 09:56:25 UTC

Technical Analysis

CVE-2025-70974 is a critical vulnerability in Alibaba's Fastjson library, a widely used Java JSON parser and serializer. The flaw stems from improper handling of the @type key in JSON input, which Fastjson uses to determine the Java class to instantiate during deserialization. Versions prior to 1.2.48 fail to properly restrict or validate the classes specified, allowing attackers to specify arbitrary Java classes. When these classes have public methods that can be invoked during deserialization, attackers can exploit this to perform JNDI injection by embedding malicious payloads elsewhere in the JSON document. JNDI injection can lead to remote code execution by causing the application to fetch and execute attacker-controlled code from LDAP or other JNDI-supported services. This vulnerability is a direct consequence of an incomplete remediation of CVE-2017-18349 and is related to CVE-2022-25845, which demonstrated bypass techniques. The CVSS v3.1 score of 10.0 reflects the vulnerability's ease of exploitation (no authentication or user interaction required), its network attack vector, and its severe impact on confidentiality, integrity, and availability. Exploitation can lead to full system compromise, data theft, or service disruption. Although no known exploits in the wild are reported at the time of publication, the criticality and history of exploitation of similar Fastjson vulnerabilities warrant immediate attention. The vulnerability affects all applications using vulnerable Fastjson versions, especially those exposed to untrusted JSON input, such as web services and APIs.

Potential Impact

For European organizations, the impact of CVE-2025-70974 is severe. Exploitation can lead to remote code execution, allowing attackers to take full control of affected systems, steal sensitive data, disrupt services, or move laterally within networks. Industries with heavy reliance on Java applications and Fastjson, such as banking, telecommunications, healthcare, and government, face heightened risks. Compromise of critical infrastructure or sensitive personal data could result in regulatory penalties under GDPR and damage to reputation. The vulnerability's network accessibility and lack of authentication requirements increase the likelihood of automated exploitation attempts. Additionally, the widespread use of Fastjson in enterprise software and cloud services across Europe amplifies the potential attack surface. Organizations may also face challenges in detection and response due to the subtlety of deserialization attacks and the complexity of Java environments.

Mitigation Recommendations

European organizations should immediately identify all instances of Fastjson in their environments, including transitive dependencies in third-party software. They must upgrade to Fastjson version 1.2.48 or later, where the vulnerability is fixed. If upgrading is not immediately feasible, organizations should implement strict input validation and disable autoType features or restrict allowed classes via Fastjson's white-listing mechanisms. Network-level controls such as web application firewalls (WAFs) should be configured to detect and block suspicious JSON payloads containing @type keys referencing dangerous classes. Monitoring and logging deserialization activities can help detect exploitation attempts. Security teams should conduct thorough code reviews and penetration testing focused on deserialization vulnerabilities. Additionally, organizations should ensure their incident response plans include scenarios involving deserialization attacks and JNDI injection. Vendor coordination is critical to ensure third-party applications are also patched promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T06:43:23.338Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6960a6a3ecefc3cd7c0ce3f6

Added to database: 1/9/2026, 6:56:35 AM

Last enriched: 1/16/2026, 9:56:25 AM

Last updated: 2/21/2026, 3:37:49 AM

Views: 169

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats