A critical security vulnerability (CVE-2025-29953) in Apache ActiveMQ’s NMS OpenWire Client has been disclosed, enabling remote attackers to execute arbitrary code on vulnerable systems. The flaw, rooted in unsafe deserialization of untrusted data, affects versions prior to 2.1.1 and poses significant risks to organizations using the messaging broker for application communication. Attackers can craft malicious payloads to exploit the OpenWire protocol, leading to deserialization of harmful data and subsequent arbitrary code execution on the client side. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. As messaging systems remain a high-value target for attackers, proactive updates and adherence to secure coding practices are critical to mitigating emerging threats. This flaw, classified under CWE-502 (Deserialization of Untrusted Data), earned a critical CVSS score of 9.8 due to its low attack complexity and high impact on confidentiality, integrity, and availability, reads the advisory. While Apache introduced an allow/denylist feature in version 2.1.0 to restrict deserialization, researchers found it could be bypassed, leaving systems unprotected. Kaaviya is a Security Editor and fellow reporter with Cyber Security News. Organizations using ActiveMQ should prioritize patching and review logging for signs of exploitation, such as unexpected deserialization errors or connections from unverified sources.
This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 01 May 2025 08:50:06 +0000