Apache Avro vulnerabilities

7 known vulnerabilities affecting apache/avro.

Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH6

Vulnerabilities

Page 1 of 1
CVE-2025-33042HIGHCVSS 7.3fixed in 1.11.5v1.12.02026-02-13
CVE-2025-33042 [HIGH] CWE-94 CVE-2025-33042: Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Avro Java SDK when Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Avro Java SDK when generating specific records from untrusted Avro schemas. This issue affects Apache Avro Java SDK: all versions through 1.11.4 and version 1.12.0. Users are recommended to upgrade to version 1.12.1 or 1.11.5, which fix the issue.
nvd
CVE-2024-47561CRITICALCVSS 9.2fixed in 1.11.42024-10-03
CVE-2024-47561 [CRITICAL] CWE-502 CVE-2024-47561: Schema parsing in the Java SDK of Apache Avro 1.11.3 and previous versions allows bad actors to exec Schema parsing in the Java SDK of Apache Avro 1.11.3 and previous versions allows bad actors to execute arbitrary code. Users are recommended to upgrade to version 1.11.4 or 1.12.0, which fix this issue.
nvd
CVE-2023-39410HIGHCVSS 7.5fixed in 1.11.32023-09-29
CVE-2023-39410 [HIGH] CWE-502 CVE-2023-39410: When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system. This issue affects Java applications using Apache Avro Java SDK up to and including 1.11.2. Users should update to apache-avro version 1.11.3 which addresses this issue.
nvd
CVE-2022-36124HIGHCVSS 7.5fixed in 0.14.02022-08-09
CVE-2022-36124 [HIGH] CWE-770 CVE-2022-36124: It is possible for a Reader to consume memory beyond the allowed constraints and thus lead to out of It is possible for a Reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.
nvd
CVE-2022-35724HIGHCVSS 7.5fixed in 0.14.02022-08-09
CVE-2022-35724 [HIGH] CWE-20 CVE-2022-35724: It is possible to provide data to be read that leads the reader to loop in cycles endlessly, consumi It is possible to provide data to be read that leads the reader to loop in cycles endlessly, consuming CPU. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.
nvd
CVE-2022-36125HIGHCVSS 7.5fixed in 0.14.02022-08-09
CVE-2022-36125 [HIGH] CWE-20 CVE-2022-36125: It is possible to crash (panic) an application by providing a corrupted data to be read. This issue It is possible to crash (panic) an application by providing a corrupted data to be read. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.
nvd
CVE-2021-43045HIGHCVSS 7.5fixed in 1.11.02022-01-06
CVE-2021-43045 [HIGH] CWE-770 CVE-2021-43045: A vulnerability in the .NET SDK of Apache Avro allows an attacker to allocate excessive resources, p A vulnerability in the .NET SDK of Apache Avro allows an attacker to allocate excessive resources, potentially causing a denial-of-service attack. This issue affects .NET applications using Apache Avro version 1.10.2 and prior versions. Users should update to version 1.11.0 which addresses this issue.
nvd