Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22187: CWE-502 Deserialization of Untrusted Data in Open Microscopy Environment Bio-Formats

0
Medium
VulnerabilityCVE-2026-22187cvecve-2026-22187cwe-502
Published: Wed Jan 07 2026 (01/07/2026, 20:27:06 UTC)
Source: CVE Database V5
Vendor/Project: Open Microscopy Environment
Product: Bio-Formats

Description

Bio-Formats versions up to and including 8.3.0 perform unsafe Java deserialization of attacker-controlled memoization cache files (.bfmemo) during image processing. The loci.formats.Memoizer class automatically loads and deserializes memo files associated with images without validation, integrity checks, or trust enforcement. An attacker who can supply a crafted .bfmemo file alongside an image can trigger deserialization of untrusted data, which may result in denial of service, logic manipulation, or potentially remote code execution in environments where suitable gadget chains are present on the classpath.

AI-Powered Analysis

AILast updated: 01/07/2026, 21:02:32 UTC

Technical Analysis

CVE-2026-22187 is a vulnerability classified under CWE-502 (Deserialization of Untrusted Data) affecting the Bio-Formats component of the Open Microscopy Environment project. Bio-Formats is widely used for reading and writing life sciences image file formats. The vulnerability arises because the loci.formats.Memoizer class automatically loads and deserializes memoization cache files (.bfmemo) associated with images without performing any validation, integrity checks, or enforcing trust boundaries. Since Java deserialization can execute arbitrary code if maliciously crafted serialized objects are processed, an attacker who can supply a specially crafted .bfmemo file alongside an image can exploit this to cause denial of service, manipulate program logic, or potentially achieve remote code execution if the runtime environment contains exploitable gadget chains on the classpath. The attack vector requires the attacker to have the ability to place or influence the .bfmemo file used during image processing, and user interaction is needed to open or process the image. The CVSS 4.0 base score is 6.8 (medium), reflecting local attack vector, low complexity, no privileges required, but user interaction needed and limited scope impact. No patches are currently linked, and no known exploits have been reported in the wild. The vulnerability is significant in environments where Bio-Formats is used to process images from untrusted or external sources, such as collaborative research, medical imaging, or bioinformatics pipelines.

Potential Impact

For European organizations, particularly research institutions, universities, hospitals, and biotech companies using Bio-Formats for microscopy image processing, this vulnerability poses a risk of service disruption, data manipulation, or potentially full system compromise if exploited. Denial of service could interrupt critical image analysis workflows, impacting research timelines or clinical diagnostics. Logic manipulation could lead to incorrect scientific conclusions or medical decisions. Remote code execution, although conditional on environment specifics, could allow attackers to execute arbitrary code, potentially leading to data breaches or lateral movement within networks. Since Bio-Formats is used in specialized scientific and medical contexts, the impact extends beyond IT systems to potentially affect patient care and scientific integrity. The requirement for local file supply and user interaction limits remote exploitation but does not eliminate risk in collaborative or multi-user environments where untrusted files may be introduced.

Mitigation Recommendations

European organizations should implement strict input validation and file handling policies to prevent untrusted .bfmemo files from being processed. Disable or restrict the use of memoization cache files if possible, or modify the Bio-Formats configuration to avoid automatic deserialization of these files. Employ sandboxing or containerization for image processing workflows to limit the impact of potential exploits. Monitor and audit file sources rigorously, especially in collaborative environments where external data is imported. Keep abreast of updates from the Open Microscopy Environment project and apply patches promptly once available. Consider implementing application whitelisting and runtime application self-protection (RASP) to detect and block suspicious deserialization activities. Educate users about the risks of opening untrusted image files and associated cache files. Finally, review and harden Java runtime environments to minimize available gadget chains that could be leveraged for remote code execution.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-06T16:47:17.182Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695ec6692efadb62cf814038

Added to database: 1/7/2026, 8:47:37 PM

Last enriched: 1/7/2026, 9:02:32 PM

Last updated: 1/9/2026, 12:25:43 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats