CWE
502
Advisory Published
Advisory Published
Updated

CVE-2025-29953: Apache ActiveMQ NMS OpenWire Client: deserialization allowlist bypass

First published: Fri Apr 18 2025(Updated: )

Deserialization of Untrusted Data vulnerability in Apache ActiveMQ NMS OpenWire Client. This issue affects Apache ActiveMQ NMS OpenWire Client before 2.1.1 when performing connections to untrusted servers. Such servers could abuse the unbounded deserialization in the client to provide malicious responses that may eventually cause arbitrary code execution on the client. Version 2.1.0 introduced a allow/denylist feature to restrict deserialization, but this feature could be bypassed. The .NET team has deprecated the built-in .NET binary serialization feature starting with .NET 9 and suggests migrating away from binary serialization. The project is considering to follow suit and drop this part of the NMS API altogether. Users are recommended to upgrade to version 2.1.1, which fixes the issue. We also recommend to migrate away from relying on .NET binary serialization as a hardening method for the future.

Credit: security@apache.org

Affected SoftwareAffected VersionHow to fix
Apache ActiveMQ NMS OpenWire Client<2.1.1
nuget/Apache.NMS.ActiveMQ<2.1.1
2.1.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2025-29953?

    CVE-2025-29953 is classified as a critical vulnerability due to the potential for remote code execution via untrusted data deserialization.

  • How do I fix CVE-2025-29953?

    To mitigate CVE-2025-29953, update Apache ActiveMQ NMS OpenWire Client to version 2.1.1 or later.

  • Which versions of Apache ActiveMQ NMS OpenWire Client are affected by CVE-2025-29953?

    CVE-2025-29953 affects Apache ActiveMQ NMS OpenWire Client versions prior to 2.1.1.

  • What are the impacts of CVE-2025-29953 on my system?

    Exploitation of CVE-2025-29953 can lead to unauthorized code execution and potential system compromise.

  • Is there a way to mitigate the risk of CVE-2025-29953 without an immediate upgrade?

    As a temporary measure, ensure connections are made only to trusted servers and limit exposure to untrusted data.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203