First published: Wed Mar 19 2025(Updated: )
Deserialization of Untrusted Data vulnerability in Apache Seata (incubating). This issue affects Apache Seata (incubating): from 2.0.0 before 2.2.0. Users are recommended to upgrade to version 2.2.0, which fixes the issue.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Seata Server | >=2.0.0<2.2.0 | |
maven/org.apache.seata:seata-config-core | >=2.0.0<2.2.0 | 2.2.0 |
Apache Seata Server | >=2.0.0<2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47552 is considered a high severity vulnerability due to its potential for remote code execution through deserialization of untrusted data.
To fix CVE-2024-47552, upgrade Apache Seata from any version prior to 2.2.0 to version 2.2.0 or later.
CVE-2024-47552 affects Apache Seata versions from 2.0.0 to prior to 2.2.0.
CVE-2024-47552 is categorized as a deserialization of untrusted data vulnerability.
Yes, if exploited, CVE-2024-47552 could potentially lead to unauthorized data access and compromise of the system.