Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4735: CWE-502 Deserialization of Untrusted Data in DTStack chunjun

0
High
VulnerabilityCVE-2026-4735cvecve-2026-4735cwe-502
Published: Tue Mar 24 2026 (03/24/2026, 03:08:18 UTC)
Source: CVE Database V5
Vendor/Project: DTStack
Product: chunjun

Description

CVE-2026-4735 is a high-severity deserialization of untrusted data vulnerability affecting DTStack chunjun versions before 1. 16. 1. The flaw exists in the chunjun-core module, specifically in the GsonUtil. java file, allowing remote attackers to exploit unsafe deserialization without requiring authentication or user interaction. This vulnerability can lead to significant impacts on data integrity and confidentiality, potentially enabling remote code execution or data manipulation. Although no known exploits are currently reported in the wild, the vulnerability's characteristics and CVSS score of 8. 7 indicate a serious risk. Organizations using chunjun for data integration or ETL processes should prioritize patching and implement strict input validation and deserialization controls. Countries with significant use of DTStack products and critical data infrastructure are at higher risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 03:47:51 UTC

Technical Analysis

CVE-2026-4735 is a vulnerability classified under CWE-502, which involves deserialization of untrusted data within the DTStack chunjun software, specifically in versions prior to 1.16.1. The vulnerability resides in the chunjun-core module's GsonUtil.java file, where unsafe deserialization practices allow attackers to supply maliciously crafted serialized objects. When these objects are deserialized without proper validation or filtering, it can lead to arbitrary code execution, data tampering, or denial of service. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector indicates a high impact on data integrity and confidentiality, with an overall score of 8.7, reflecting the ease of exploitation and the critical nature of the affected component. Although no public exploits have been observed, the vulnerability's presence in a widely used data integration tool poses a significant threat to organizations relying on chunjun for ETL and data processing tasks. The lack of available patches at the time of reporting necessitates immediate attention to mitigation strategies.

Potential Impact

The exploitation of CVE-2026-4735 can have severe consequences for organizations globally. Since chunjun is used for data integration and ETL processes, successful exploitation could allow attackers to execute arbitrary code, manipulate or corrupt data pipelines, and compromise the confidentiality and integrity of sensitive data. This can lead to data breaches, disruption of business-critical data workflows, and potential lateral movement within affected networks. The vulnerability's remote and unauthenticated nature increases the attack surface, making it attractive for threat actors. Organizations in sectors such as finance, healthcare, telecommunications, and government, where data integrity and confidentiality are paramount, face heightened risks. Additionally, compromised ETL processes can undermine trust in data analytics and decision-making systems, amplifying operational and reputational damage.

Mitigation Recommendations

To mitigate CVE-2026-4735, organizations should immediately upgrade DTStack chunjun to version 1.16.1 or later once available, as this version addresses the vulnerability. Until patches are applied, implement strict input validation and sanitization on all data entering the deserialization routines, especially from untrusted sources. Employ application-layer firewalls or network segmentation to restrict access to chunjun services, limiting exposure to untrusted networks. Enable runtime application self-protection (RASP) or use security monitoring tools to detect anomalous deserialization activities. Review and harden serialization configurations to disable or restrict polymorphic deserialization features in Gson or related libraries. Conduct thorough code audits to identify and remediate other unsafe deserialization patterns. Finally, maintain up-to-date backups and incident response plans to quickly recover from potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GovTech CSG
Date Reserved
2026-03-24T03:07:43.669Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c2056cf4197a8e3bc861c7

Added to database: 3/24/2026, 3:30:52 AM

Last enriched: 3/24/2026, 3:47:51 AM

Last updated: 3/24/2026, 4:48:49 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses