
Cloud Vulnerability DB
A community-led vulnerabilities database
An XML Deserialization vulnerability was discovered in glazedlists version 1.11.0, identified as CVE-2023-31890. The vulnerability allows attackers to execute arbitrary code via the BeanXMLByteCoder.decode() parameter (NVD, CVE). The issue was reported on April 26, 2023, and affects the Java-based GlazedLists library (GitHub Issue).
The vulnerability exists in the BeanXMLByteCoder class within the ca.odell.glazedlists.impl.io package. The decode() method processes XML input using XMLDecoder.readObject() without proper validation, leading to unsafe deserialization of XML data. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is classified under CWE-502 (Deserialization of Untrusted Data) (NVD).
The vulnerability allows attackers to execute arbitrary code on affected systems through malicious XML input. Given the CVSS score of 9.8, this represents a critical security risk with potential for complete system compromise, including unauthorized code execution with the privileges of the application (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."