CVE-2025-70974 PUBLISHED

Assigner: mitre
Reserved: 09.01.2026 Published: 09.01.2026 Updated: 09.01.2026

Fastjson before 1.2.48 mishandles autoType because, when an @type key is in a JSON document, and the value of that key is the name of a Java class, there may be calls to certain public methods of that class. Depending on the behavior of those methods, there may be JNDI injection with an attacker-supplied payload located elsewhere in that JSON document. This was exploited in the wild in 2023 through 2025. NOTE: this issue exists because of an incomplete fix for CVE-2017-18349. Also, a later bypass is covered by CVE-2022-25845.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CVSS Score: 10

Product Status

Vendor Alibaba
Product Fastjson
Versions Default: unaffected
  • affected from 0 to 1.2.48 (excl.)

References

Problem Types

  • CWE-829 Inclusion of Functionality from Untrusted Control Sphere CWE