CVE-2025-53393
Java vulnerability analysis and mitigation

Overview

In Akka through version 2.10.6, a vulnerability was identified where akka-cluster-metrics uses Java serialization for cluster metrics. The vulnerability was discovered and disclosed on June 28, 2025, and has been assigned CVE-2025-53393. This issue affects the Akka framework's cluster metrics component (NVD, CVE).

Technical details

The vulnerability is classified as CWE-502 (Deserialization of Untrusted Data) with a CVSS v3.1 Base Score of 6.0 (MEDIUM). The vector string is CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L, indicating that the vulnerability is network accessible, requires high attack complexity, low privileges, no user interaction, and has a scope that can change with low impacts to confidentiality, integrity, and availability (NVD).

Impact

The vulnerability potentially affects cluster metrics functionality in Akka deployments, particularly concerning the serialization of data types like BigDecimal and BigInteger. During rolling updates, this could result in serialization errors, though these issues should resolve once the rollout is completed (Github PR).

Mitigation and workarounds

A fix has been implemented through a pull request that removes Java serialization for cluster metrics. The issue has been addressed in the development branch and is scheduled for release in version 2.10.7 (Github PR).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management