Known Exploited Vulnerabilities Deserialization of Untrusted Data Capability Group

All Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
CVE-2023-46604 Apache ActiveMQ Deserialization of Untrusted Data Vulnerability secondary_impact T1053.005 Scheduled Task
Comments
This vulnerability is exploited by a remote attacker who manipulates serialized class types in the OpenWire protocol to run arbitrary shell commands. This allows the adversary to execute remote code, leading to the download and installation of malware, such as the Kinsing malware and cryptocurrency miners, on Linux systems. Additionally, attackers have attempted to deploy ransomware, attributed to the HelloKitty ransomware family, on target systems.
References
CVE-2023-46604 Apache ActiveMQ Deserialization of Untrusted Data Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability is exploited by a remote attacker who manipulates serialized class types in the OpenWire protocol to run arbitrary shell commands. This allows the adversary to execute remote code, leading to the download and installation of malware, such as the Kinsing malware and cryptocurrency miners, on Linux systems. Additionally, attackers have attempted to deploy ransomware, attributed to the HelloKitty ransomware family, on target systems.
References
CVE-2023-46604 Apache ActiveMQ Deserialization of Untrusted Data Vulnerability primary_impact T1059.004 Unix Shell
Comments
This vulnerability is exploited by a remote attacker who manipulates serialized class types in the OpenWire protocol to run arbitrary shell commands. This allows the adversary to execute remote code, leading to the download and installation of malware, such as the Kinsing malware and cryptocurrency miners, on Linux systems. Additionally, attackers have attempted to deploy ransomware, attributed to the HelloKitty ransomware family, on target systems.
References
CVE-2023-40044 Progress WS_FTP Server Deserialization of Untrusted Data Vulnerability secondary_impact T1202 Indirect Command Execution
Comments
Zero-day .NET deserialization vulnerability that allows an adversary to make an HTTP POST request to a vulnerable WS_FTP Server and execute commands.
References
CVE-2023-40044 Progress WS_FTP Server Deserialization of Untrusted Data Vulnerability exploitation_technique T1059 Command and Scripting Interpreter
Comments
Zero-day .NET deserialization vulnerability that allows an adversary to make an HTTP POST request to a vulnerable WS_FTP Server and execute commands.
References
CVE-2023-40044 Progress WS_FTP Server Deserialization of Untrusted Data Vulnerability primary_impact T1071.002 File Transfer Protocols
Comments
Zero-day .NET deserialization vulnerability that allows an adversary to make an HTTP POST request to a vulnerable WS_FTP Server and execute commands.
References
CVE-2023-38203 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability can be utilized by exploited a public-facing application. APT groups have used this exploit to deploy webshells.
References
CVE-2023-38203 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability primary_impact T1105 Ingress Tool Transfer
Comments
This vulnerability can be utilized by exploited a public-facing application. APT groups have used this exploit to deploy webshells.
References
CVE-2023-29492 Novi Survey Insecure Deserialization Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
CVE-2023-29492 is an insecure deserialization vulnerability. Exploitation of this vulnerability gives remote attackers arbitrary code execution in the context of the service account.
References
CVE-2023-29300 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability can be utilized by exploited a public-facing application. APT groups have used this exploit to deploy webshells.
References
CVE-2023-29300 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability primary_impact T1105 Ingress Tool Transfer
Comments
This vulnerability can be utilized by exploited a public-facing application. APT groups have used this exploit to deploy webshells.
References
CVE-2023-26360 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability gives an adversary access through exploitation of a public-facing server.
References
CVE-2023-26360 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability secondary_impact T1071.001 Web Protocols
Comments
This vulnerability gives an adversary access through exploitation of a public-facing server.
References
CVE-2023-26360 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability secondary_impact T1105 Ingress Tool Transfer
Comments
This vulnerability gives an adversary access through exploitation of a public-facing server.
References
CVE-2023-26360 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability secondary_impact T1046 Network Service Discovery
Comments
This vulnerability gives an adversary access through exploitation of a public-facing server.
References
CVE-2023-26360 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability secondary_impact T1003.001 LSASS Memory
Comments
This vulnerability gives an adversary access through exploitation of a public-facing server.
References
CVE-2023-26360 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability secondary_impact T1036.005 Match Legitimate Name or Location
Comments
This vulnerability gives an adversary access through exploitation of a public-facing server.
References
CVE-2023-26360 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability secondary_impact T1484.001 Group Policy Modification
Comments
This vulnerability gives an adversary access through exploitation of a public-facing server.
References
CVE-2023-26360 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability secondary_impact T1505.003 Web Shell
Comments
This vulnerability gives an adversary access through exploitation of a public-facing server.
References
CVE-2023-26360 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability primary_impact T1059.007 JavaScript
Comments
This vulnerability gives an adversary access through exploitation of a public-facing server.
References
CVE-2023-26359 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability is utilized by exploiting a public-facing server.
References
CVE-2023-26359 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
This vulnerability is utilized by exploiting a public-facing server.
References
CVE-2021-45046 Apache Log4j2 Deserialization of Untrusted Data Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE 2021-45046 is a Log4J-related vulnerability that could enable enables an attacker to cause Remote Code Execution or other effects in certain non-default configurations. This specific vulnerability has been reported to have been leveraged in cryptomining and ransomware operations.
References
CVE-2021-45046 Apache Log4j2 Deserialization of Untrusted Data Vulnerability secondary_impact T1486 Data Encrypted for Impact
CVE-2019-18935 Progress Telerik UI for ASP.NET AJAX Deserialization of Untrusted Data Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
CVE 2019-18935 is a Insecure Deserialization vulnerability with the Telerik UI, which does not properly sanitize serialized data inputs from the user. This vulnerability leads to the application being vulnerable to RCE attacks that may lead to a full system compromise.
References
CVE-2019-18935 Progress Telerik UI for ASP.NET AJAX Deserialization of Untrusted Data Vulnerability primary_impact T1496 Resource Hijacking
Comments
CVE 2019-18935 is a Insecure Deserialization vulnerability with the Telerik UI, which does not properly sanitize serialized data inputs from the user. This vulnerability leads to the application being vulnerable to RCE attacks that may lead to a full system compromise.
References
CVE-2019-18935 Progress Telerik UI for ASP.NET AJAX Deserialization of Untrusted Data Vulnerability primary_impact T1041 Exfiltration Over C2 Channel
Comments
CVE 2019-18935 is a Insecure Deserialization vulnerability with the Telerik UI, which does not properly sanitize serialized data inputs from the user. This vulnerability leads to the application being vulnerable to RCE attacks that may lead to a full system compromise.
References
CVE-2019-18935 Progress Telerik UI for ASP.NET AJAX Deserialization of Untrusted Data Vulnerability primary_impact T1505.003 Web Shell
Comments
CVE 2019-18935 is a Insecure Deserialization vulnerability with the Telerik UI, which does not properly sanitize serialized data inputs from the user. This vulnerability leads to the application being vulnerable to RCE attacks that may lead to a full system compromise.
References
CVE-2018-4939 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability primary_impact T1190 Exploit Public-Facing Application
CVE-2018-4939 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability exploitation_technique T1203 Exploitation for Client Execution
Comments
This deserialization vulnerability allows adversaries to insert their own objects into client software for potential execution.
References
CVE-2018-4939 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability primary_impact T1133 External Remote Services
CVE-2017-9805 Apache Struts Deserialization of Untrusted Data Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
CVE-2017-9805 is a deserialization vulnerability in the Apache Struts REST Plugin that could allow an attacker to execute arbitrary commands remotely on the affected systems by sending a specially crafted web request to the application.
References
CVE-2017-9805 Apache Struts Deserialization of Untrusted Data Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE-2017-9805 is a deserialization vulnerability in the Apache Struts REST Plugin that could allow an attacker to execute arbitrary commands remotely on the affected systems by sending a specially crafted web request to the application.
References
CVE-2025-23006 SonicWall SMA1000 Appliances Deserialization Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This pre-authentication vulnerability, present in SonicWall SMA1000 appliances running version 12.4.3-02804 or earlier, allows attackers to perform remote code execution on exploited machines, allowing for arbitrary OS command execution.
References
CVE-2025-23006 SonicWall SMA1000 Appliances Deserialization Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
This pre-authentication vulnerability, present in SonicWall SMA1000 appliances running version 12.4.3-02804 or earlier, allows attackers to perform remote code execution on exploited machines, allowing for arbitrary OS command execution.
References
CVE-2025-0994 Trimble Cityworks Deserialization Vulnerability exploitation_technique T1068 Exploitation for Privilege Escalation
Comments
A deserialization vulnerability in Trimble Cityworks versions before 15.8.9 (and Cityworks with Office Companion versions prior to 23.10) can be exploited by attackers using maliciously crafted serialized objects to the server, ending with escalated privileges permitting the execution remote code against a target's Microsoft IIS web server.
References
CVE-2025-0994 Trimble Cityworks Deserialization Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
A deserialization vulnerability in Trimble Cityworks versions before 15.8.9 (and Cityworks with Office Companion versions prior to 23.10) can be exploited by attackers to execute remote code against a target web server.
References
CVE-2024-20953 Oracle Agile Product Lifecycle Management (PLM) Deserialization Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
An attacker can create a serialized object specifically designed to exploit the deserialization vulnerability, embedding this payload into a request, which is then sent to a WebLogic server, leading to arbitrary code execution.
References
CVE-2024-20953 Oracle Agile Product Lifecycle Management (PLM) Deserialization Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
An attacker can create a serialized object specifically designed to exploit the deserialization vulnerability, embedding this payload into a request, which is then sent to a WebLogic server, leading to arbitrary code execution.
References
CVE-2025-24016 Wazuh Server Deserialization of Untrusted Data Vulnerability secondary_impact T1203 Exploitation for Client Execution
Comments
Attackers with API access have been reported as exploiting this vulnerability through a JSON payload sent to a Wazuh worker server. Requests relayed to the master server can result in arbitrary code execution.
References
CVE-2025-24016 Wazuh Server Deserialization of Untrusted Data Vulnerability exploitation_technique T1078 Valid Accounts
Comments
Attackers with API access have been reported as exploiting this vulnerability through a JSON payload sent to a Wazuh worker server. Requests relayed to the master server can result in arbitrary code execution.
References
CVE-2025-24016 Wazuh Server Deserialization of Untrusted Data Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
Attackers with API access have been reported as exploiting this vulnerability through a JSON payload sent to a Wazuh worker server. Requests relayed to the master server can result in arbitrary code execution.
References
CVE-2025-53770 Microsoft SharePoint Deserialization of Untrusted Data Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This deserialization vulnerability in Microsoft SharePoint allows an unauthenticated remote attacker to execute remote code on the network.
References
CVE-2025-53770 Microsoft SharePoint Deserialization of Untrusted Data Vulnerability exploitation_technique T1059 Command and Scripting Interpreter
Comments
This deserialization vulnerability in Microsoft SharePoint allows an unauthenticated remote attacker to execute remote code on the network.
References
CVE-2025-42999 SAP NetWeaver Deserialization Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This deserialization vulnerability in NetWeaver Visual Composer, when chained with CVE-2025-31324, allows an attacker to execute unauthenticated remote code with administrator privileges, leading to consequences such as web shell deployment.
References
CVE-2025-42999 SAP NetWeaver Deserialization Vulnerability exploitation_technique T1203 Exploitation for Client Execution
Comments
This deserialization vulnerability in NetWeaver Visual Composer, when chained with CVE-2025-31324, allows an attacker to execute unauthenticated remote code with administrator privileges, leading to consequences such as web shell deployment.
References
CVE-2025-42999 SAP NetWeaver Deserialization Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
This deserialization vulnerability in NetWeaver Visual Composer, when chained with CVE-2025-31324, allows an attacker to execute unauthenticated remote code with administrator privileges, leading to consequences such as web shell deployment.
References
CVE-2025-42999 SAP NetWeaver Deserialization Vulnerability secondary_impact T1505.003 Web Shell
Comments
This deserialization vulnerability in NetWeaver Visual Composer, when chained with CVE-2025-31324, allows an attacker to execute unauthenticated remote code with administrator privileges, leading to consequences such as web shell deployment.
References

Capabilities

Capability ID Capability Name Number of Mappings
CVE-2019-18935 Progress Telerik UI for ASP.NET AJAX Deserialization of Untrusted Data Vulnerability 4
CVE-2017-9805 Apache Struts Deserialization of Untrusted Data Vulnerability 2
CVE-2023-26359 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability 2
CVE-2024-20953 Oracle Agile Product Lifecycle Management (PLM) Deserialization Vulnerability 2
CVE-2023-29300 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability 2
CVE-2025-0994 Trimble Cityworks Deserialization Vulnerability 2
CVE-2023-46604 Apache ActiveMQ Deserialization of Untrusted Data Vulnerability 3
CVE-2023-38203 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability 2
CVE-2018-4939 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability 3
CVE-2023-29492 Novi Survey Insecure Deserialization Vulnerability 1
CVE-2025-24016 Wazuh Server Deserialization of Untrusted Data Vulnerability 3
CVE-2023-26360 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability 9
CVE-2023-40044 Progress WS_FTP Server Deserialization of Untrusted Data Vulnerability 3
CVE-2021-45046 Apache Log4j2 Deserialization of Untrusted Data Vulnerability 2
CVE-2025-23006 SonicWall SMA1000 Appliances Deserialization Vulnerability 2
CVE-2025-42999 SAP NetWeaver Deserialization Vulnerability 4
CVE-2025-53770 Microsoft SharePoint Deserialization of Untrusted Data Vulnerability 2