CVE-2026-42779

The fix for CVE-2026-41635 was not applied to the 2.1.X and 2.2.X branches. Here was the original issue description: Apache MINA's AbstractIoBuffer.resolveClass() contains two branches, one of them (for static classes or primitive types) does not check the class at all, bypassing the classname allowlist and allowing arbitrary code to be executed. The fix checks if the class is present in the accepted class filter before calling Class.forName(). Affected versions are Apache MINA 2.1.0 <= 2.1.11, and 2.2.0 <= 2.2.6. The problem is resolved in Apache MINA 2.1.12, and 2.2.7 by applying the classname allowlist earlier. Affected are applications using Apache MINA that call IoBuffer.getObject(). Applications using Apache MINA are advised to upgrade.
References
Link Resource
https://lists.apache.org/thread/fhlx5k91hrkgyzh7yk1nghrn3k27gxy0 Patch Vendor Advisory Mailing List
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:mina:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:mina:*:*:*:*:*:*:*:*

History

01 May 2026, 17:55

Type Values Removed Values Added
First Time Apache
Apache mina
References () https://lists.apache.org/thread/fhlx5k91hrkgyzh7yk1nghrn3k27gxy0 - () https://lists.apache.org/thread/fhlx5k91hrkgyzh7yk1nghrn3k27gxy0 - Patch, Vendor Advisory, Mailing List
CPE cpe:2.3:a:apache:mina:*:*:*:*:*:*:*:*

01 May 2026, 11:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-05-01 11:16

Updated : 2026-05-01 17:55


NVD link : CVE-2026-42779

Mitre link : CVE-2026-42779

CVE.ORG link : CVE-2026-42779


JSON object : View

Products Affected

apache

  • mina
CWE
CWE-502

Deserialization of Untrusted Data