{
  "affected": [
    {
      "ranges": [
        {
          "database_specific": {
            "versions": [
              {
                "introduced": "2.0.0"
              },
              {
                "fixed": "3.5.0"
              },
              {
                "introduced": "0"
              },
              {
                "last_affected": "4.0.0-m1"
              }
            ]
          },
          "events": [
            {
              "introduced": "75d21bcb30d85bc37d9115fc14cc35ce4271b986"
            },
            {
              "fixed": "66e985d5c85b84e8147d4339c17950a48ee09c2c"
            },
            {
              "introduced": "0"
            },
            {
              "last_affected": "a65669305380641490c6137d7b3d6b4a2fbf6c4d"
            }
          ],
          "repo": "https://github.com/apache/causeway",
          "type": "GIT"
        }
      ]
    }
  ],
  "details": "Apache Causeway faces Java deserialization vulnerabilities that allow remote code execution (RCE) through user-controllable URL parameters. These vulnerabilities affect all applications using Causeway's ViewModel functionality and can be exploited by authenticated attackers to execute arbitrary code with application privileges. \n\nThis issue affects all current versions.\n\nUsers are recommended to upgrade to version 3.5.0, which fixes the issue.",
  "id": "CVE-2025-64408",
  "modified": "2026-03-13T21:56:48.948831660Z",
  "published": "2025-11-19T11:15:47.790Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://lists.apache.org/thread/rjlg4spqhmgy1xgq9wq5h2tfnq4pm70b"
    },
    {
      "type": "ADVISORY",
      "url": "http://www.openwall.com/lists/oss-security/2025/11/19/1"
    }
  ],
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
      "type": "CVSS_V3"
    }
  ]
}