CVE-2019-14893
Java vulnerability analysis and mitigation

Overview

A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods. The vulnerability was discovered in 2019 and assigned identifier CVE-2019-14893. The vulnerability affects applications using jackson-databind library with specific configurations that enable polymorphic type handling (CVE-MITRE).

Technical details

The vulnerability occurs when using polymorphic type handling methods such as enableDefaultTyping() or when @JsonTypeInfo is using Id.CLASS or Id.MINIMAL_CLASS, or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. The vulnerability specifically involves the xalan JNDI gadget that can be exploited when deserializing objects (BUGZILLA).

Impact

A successful exploitation of this vulnerability could lead to arbitrary code execution. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL), indicating the highest severity level with potential for complete compromise of affected systems (NETAPP-ADVISORY).

Mitigation and workarounds

The vulnerability has been fixed in jackson-databind versions 2.9.10 and 2.10.0. Organizations should upgrade to these or later versions to address the vulnerability. If immediate upgrading is not possible, it is recommended to avoid deserialization from untrusted sources and disable polymorphic type handling features (GITHUB-ISSUE).

Community reactions

Multiple vendors and organizations responded to this vulnerability by releasing security advisories and patches, including Red Hat, NetApp, and Oracle. Red Hat rated this update as having a security impact of Important, while NetApp classified it as Critical with a CVSS score of 9.8 (NETAPP-ADVISORY, REDHAT-BUGZILLA).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65091CRITICAL10
  • JavaJava
  • org.xwiki.contrib:macro-fullcalendar-pom
NoYesJan 10, 2026
CVE-2025-70974CRITICAL10
  • JavaJava
  • com.alibaba:fastjson
NoYesJan 09, 2026
CVE-2026-22244HIGH8.5
  • JavaJava
  • org.open-metadata:platform
NoYesJan 08, 2026
CVE-2025-65090MEDIUM5.3
  • JavaJava
  • org.xwiki.contrib:macro-fullcalendar-pom
NoYesJan 10, 2026
CVE-2026-0707MEDIUM5.3
  • JavaJava
  • org.keycloak:keycloak-parent
NoNoJan 08, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management