A remote code execution vulnerability exists where a malicious Raft node can exploit insecure Hessian deserialization within the PD store. The fix enforces IP-based authentication to restrict cluster membership and implements a strict class whitelist to harden the Hessian serialization process against object injection attacks.
Users are recommended to upgrade to version 1.7.0, which fixes the issue.
References
Configurations
No configuration.
History
12 Dec 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
12 Dec 2025, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-12 10:15
Updated : 2025-12-12 17:15
NVD link : CVE-2025-26866
Mitre link : CVE-2025-26866
CVE.ORG link : CVE-2025-26866
JSON object : View
Products Affected
No product.
CWE
CWE-502
Deserialization of Untrusted Data
