CVE-2021-46877
Java vulnerability analysis and mitigation

Overview

A vulnerability was identified in jackson-databind versions 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1. The vulnerability, tracked as CVE-2021-46877, was disclosed on March 18, 2023, and allows attackers to cause a denial of service condition through JsonNode JDK serialization (NVD, CVE).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (High), with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. The issue specifically occurs in uncommon situations involving JsonNode JDK serialization, where an attacker can trigger excessive memory consumption of up to 2GB transient heap usage per read operation. The vulnerability is classified under CWE-770 (Allocation of Resources Without Limits or Throttling) (NVD).

Impact

When successfully exploited, this vulnerability can lead to a denial of service condition by consuming up to 2GB of transient heap memory per read operation. The impact is specifically limited to scenarios where JDK serialization is used with JsonNode types, and does not affect normal JSON reading/writing operations using ObjectMapper (Jackson User).

Mitigation and workarounds

The vulnerability has been fixed in jackson-databind versions 2.12.6 and 2.13.1. Users are recommended to upgrade to these or newer versions to address the issue. It's worth noting that versions prior to 2.10.x are not affected by this vulnerability (Jackson User).

Community reactions

The jackson-databind development team has characterized this as an issue that is "ALMOST 100% NOT AFFECTING YOU IN ANY WAY wrt security," but noted that security scanning tools would likely flag it as a significant security concern (Jackson User).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-26866HIGH8.8
  • JavaJava
  • org.apache.hugegraph:hg-pd-core
NoYesDec 12, 2025
CVE-2025-54981HIGH7.5
  • JavaJava
  • org.apache.streampark:streampark
NoYesDec 12, 2025
CVE-2025-67721MEDIUM6.3
  • JavaJava
  • trino
NoYesDec 12, 2025
CVE-2025-53960MEDIUM5.9
  • JavaJava
  • org.apache.streampark:streampark
NoYesDec 12, 2025
CVE-2025-54947MEDIUM5.3
  • JavaJava
  • org.apache.streampark:streampark
NoYesDec 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management